CVE-2025-24366

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24366
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2025-24366.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2025-24366
Aliases
Downstream
Related
Published
2025-02-07T21:16:40Z
Modified
2025-10-10T08:25:03.425682Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Insufficient sanitization of user provided rsync command in SFTPGo
Details

SFTPGo is an open source, event-driven file transfer solution. SFTPGo supports execution of a defined set of commands via SSH. Besides a set of default commands some optional commands can be activated, one of them being rsync. It is disabled in the default configuration and it is limited to the local filesystem, it does not work with cloud/remote storage backends. Due to missing sanitization of the client provided rsync command, an authenticated remote user can use some options of the rsync command to read or write files with the permissions of the SFTPGo server process. This issue was fixed in version v2.6.5 by checking the client provided arguments. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/drakkan/sftpgo

Affected ranges

Type
GIT
Repo
https://github.com/drakkan/sftpgo
Events

Affected versions

0.*

0.9.5
0.9.6

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.2.2

v2.*

v2.0.0
v2.0.1
v2.0.2
v2.1.0
v2.2.0
v2.2.1
v2.3.0
v2.4.0
v2.5.0
v2.5.1
v2.6.0
v2.6.1
v2.6.2
v2.6.3
v2.6.4