6.5 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): NONE
- User interaction (UI): REQUIRED
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): HIGH
- Availability impact (A): NONE
Rsync: path traversal vulnerability in rsync
A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.
References
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://kb.cert.org/vuls/id/952657
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- https://www.kb.cert.org/vuls/id/952657
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://www.kb.cert.org/vuls/id/952657
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- https://www.kb.cert.org/vuls/id/952657
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- https://www.kb.cert.org/vuls/id/952657
- RHSA-2025:23154 vendor-advisory x_refsource_REDHAT
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://www.kb.cert.org/vuls/id/952657
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- RHSA-2025:23154 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23235 vendor-advisory x_refsource_REDHAT
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://www.kb.cert.org/vuls/id/952657
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- RHSA-2025:23154 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23235 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23407 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23415 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23416 vendor-advisory x_refsource_REDHAT
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- https://www.kb.cert.org/vuls/id/952657
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- RHSA-2025:23154 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23235 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23407 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23415 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23416 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23842 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23853 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23854 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23858 vendor-advisory x_refsource_REDHAT
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- https://www.kb.cert.org/vuls/id/952657
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- RHSA-2025:23154 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23235 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23407 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23415 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23416 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23842 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23853 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23854 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23858 vendor-advisory x_refsource_REDHAT
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- https://www.kb.cert.org/vuls/id/952657
- RHSA-2025:23858 vendor-advisory x_refsource_REDHAT
- RHSA-2025:2600 vendor-advisory x_refsource_REDHAT
- RHSA-2025:7050 vendor-advisory x_refsource_REDHAT
- RHSA-2025:8385 vendor-advisory x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-12087 x_refsource_REDHAT vdb-entry
- RHBZ#2330672 issue-tracking x_refsource_REDHAT
- https://kb.cert.org/vuls/id/952657
- RHSA-2025:23154 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23235 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23407 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23415 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23416 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23842 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23853 vendor-advisory x_refsource_REDHAT
- RHSA-2025:23854 vendor-advisory x_refsource_REDHAT
- https://github.com/google/security-research/security/advisories/GHSA-p5pg-x43v-… exploit
- https://security.netapp.com/advisory/ntap-20250131-0002/
- https://lists.debian.org/debian-lts-announce/2025/01/msg00008.html
- https://www.kb.cert.org/vuls/id/952657
Affected products
- =<3.3.0
- *
- *
- *
Matching in nixpkgs
pkgs.rrsync
Helper to run rsync-only environments from ssh-logins
-
nixos-unstable -
- nixpkgs-unstable 3.4.1
pkgs.librsync
Implementation of the rsync remote-delta algorithm
-
nixos-unstable -
- nixpkgs-unstable 2.3.4
pkgs.openrsync
BSD-licensed implementation of rsync
-
nixos-unstable -
- nixpkgs-unstable 2025-01-27
pkgs.sqlite-rsync
Database remote-copy tool for SQLite
-
nixos-unstable -
- nixpkgs-unstable 3.50.2
pkgs.vdirsyncerStable
Synchronize calendars and contacts
-
nixos-unstable -
- nixpkgs-unstable 0.20.0
pkgs.yaziPlugins.rsync
Simple rsync plugin for yazi file manager
-
nixos-unstable -
- nixpkgs-unstable 0-unstable-2025-06-09
pkgs.vimPlugins.ethersync
Real-time co-editing of local text files
-
nixos-unstable -
- nixpkgs-unstable 0.7.0
pkgs.python312Packages.sysrsync
Simple and safe system's rsync wrapper for Python
-
nixos-unstable -
- nixpkgs-unstable 1.1.1
pkgs.python313Packages.sysrsync
Simple and safe system's rsync wrapper for Python
-
nixos-unstable -
- nixpkgs-unstable 1.1.1
pkgs.python312Packages.vdirsyncer
Synchronize calendars and contacts
-
nixos-unstable -
- nixpkgs-unstable 0.20.0
pkgs.python313Packages.vdirsyncer
Synchronize calendars and contacts
-
nixos-unstable -
- nixpkgs-unstable 0.20.0
pkgs.vscode-extensions.ethersync.ethersync
Extension for real-time co-editing of local text files
-
nixos-unstable -
- nixpkgs-unstable 0.4.0
Package maintainers
-
@jluttine Jaakko Luttinen <jaakko.luttinen@iki.fi>
-
@ethancedwards8 Ethan Carter Edwards <ethan@ethancedwards.com>
-
@Prince213 Sizhe Zhao <prc.zhao@outlook.com>
-
@fricklerhandwerk Valentin Gagarin <valentin@fricklerhandwerk.de>
-
@OPNA2608 Cosima Neidahl <opna2608@protonmail.com>
-
@wegank Weijia Wang <contact@weijia.wang>
-
@eljamm Fedi Jamoussi <fedi.jamoussi@protonmail.ch>
-
@kuznero Roman Kuznetsov <roman@kuznero.com>
-
@fgaz Francesco Gazzetta <fgaz@fgaz.me>
-
@veprbl Dmitry Kalinkin <veprbl@gmail.com>
-
@stephen-huan Stephen Huan <stephen.huan@cgdct.moe>
-
@kampfschlaefer Arnold Krille <arnold@arnoldarts.de>
-
@ivan Ivan Kozik <ivan@ludios.org>
-
@nycodeghg Marie Ramlow <tabmeier12+nix@gmail.com>
-
@JohnAZoidberg Daniel Schäfer <git@danielschaefer.me>
-
@teto Matthieu Coudron <mcoudron@hotmail.com>