{
  "threat_severity" : "Moderate",
  "public_date" : "2025-01-14T15:06:00Z",
  "bugzilla" : {
    "description" : "rsync: --safe-links option bypass leads to path traversal",
    "id" : "2330676",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2330676"
  },
  "cvss3" : {
    "cvss3_base_score" : "6.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-22",
  "details" : [ "A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory.", "A flaw was found in rsync. When using the `--safe-links` option, the rsync client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This results in a path traversal vulnerability, which may lead to arbitrary file write outside the desired directory." ],
  "statement" : "The vulnerability requires user interaction to be triggered, as the rsync client must first establish a connection/have access to the malicious rsync server (at least anonymous read-access).",
  "acknowledgement" : "Red Hat would like to thank Jasiel Spelman (Google), Pedro Gallegos (Google), and Simon Scannell (Google) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2025-03-11T00:00:00Z",
    "advisory" : "RHSA-2025:2600",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "rsync-0:3.1.3-21.el8_10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-05-13T00:00:00Z",
    "advisory" : "RHSA-2025:7050",
    "cpe" : "cpe:/a:redhat:enterprise_linux:9",
    "package" : "rsync-0:3.2.5-3.el9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2025-05-13T00:00:00Z",
    "advisory" : "RHSA-2025:7050",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "rsync-0:3.2.5-3.el9"
  }, {
    "product_name" : "Red Hat Discovery 1.14",
    "release_date" : "2025-06-02T00:00:00Z",
    "advisory" : "RHSA-2025:8385",
    "cpe" : "cpe:/a:redhat:discovery:1.14::el9",
    "package" : "discovery/discovery-ui-rhel9:sha256:492e412759cf0eedfa5b557f7b0865f8864f84d0ed75e11dc8d7a840837d9644"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 10",
    "fix_state" : "Affected",
    "package_name" : "rsync",
    "cpe" : "cpe:/o:redhat:enterprise_linux:10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "rsync",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Out of support scope",
    "package_name" : "rsync",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  }, {
    "product_name" : "Red Hat OpenShift Container Platform 4",
    "fix_state" : "Fix deferred",
    "package_name" : "rhcos",
    "cpe" : "cpe:/a:redhat:openshift:4"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2024-12088\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-12088\nhttps://kb.cert.org/vuls/id/952657" ],
  "name" : "CVE-2024-12088",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}