FS#42806 - [rsync] path hijacking vulnerability
Attached to Project:
Arch Linux
Opened by Yardena Cohen (yardenac) - Sunday, 16 November 2014, 03:56 GMT
Last edited by Pierre Schmitz (Pierre) - Friday, 15 May 2015, 12:45 GMT
Opened by Yardena Cohen (yardenac) - Sunday, 16 November 2014, 03:56 GMT
Last edited by Pierre Schmitz (Pierre) - Friday, 15 May 2015, 12:45 GMT
|
Details
An evil server can force rsync 3.1.1 to write arbitrary data
to the filesystem, which can lead to remote code
execution.
https://bugzilla.samba.org/show_bug.cgi?id=10936 |
This task depends upon
https://git.samba.org/?p=rsync.git;a=commit;h=371242e4e8150d4f9cc74cdf2d75d8250535175e
and
https://git.samba.org/?p=rsync.git;a=commit;h=4cad402ea8a91031f86c53961d78bb7f4f174790
Btw the issue seems fixed upstream: https://bugzilla.samba.org/show_bug.cgi?id=10936
https://bugzilla.samba.org/show_bug.cgi?id=10936#c6
https://bugzilla.samba.org/show_bug.cgi?id=10977
Unfortunately, they've still no fixed it completely, but they've at least fixed it for inc-recursive transfers (which are the defaults):
https://git.samba.org/?p=rsync.git;a=commit;h=962f8b90045ab331fc04c9e65f80f1a53e68243b
So for non-inc-recursive transfers, there's still no fix, but Archlinux could at least ship the above-mentioned patch.