When copying files with rsync, octorpki uses the "-a" flag 0, which forces rsync to copy binaries with the suid bit set as root. Since the provided service definition defaults to root (https://github.com/cloudflare/cfrpki/blob/master/package/octorpki.service) this could allow for a vector, when combined with another vulnerability that causes octorpki to process a malicious TAL file, for a local privilege escalation.
If you have any questions or comments about this advisory email us at security@cloudflare.com
{ "nvd_published_at": "2025-01-29T10:15:07Z", "cwe_ids": [ "CWE-269", "CWE-281" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2021-11-19T13:10:27Z" }