A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.
History

Wed, 15 Jan 2025 02:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Tue, 14 Jan 2025 22:00:00 +0000

Type Values Removed Values Added
References

Tue, 14 Jan 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Jan 2025 17:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in rsync. It could allow a server to enumerate the contents of an arbitrary file from the client's machine. This issue occurs when files are being copied from a client to a server. During this process, the rsync server will send checksums of local data to the client to compare with in order to determine what data needs to be sent to the server. By sending specially constructed checksum values for arbitrary files, an attacker may be able to reconstruct the data of those files byte-by-byte based on the responses from the client.
Title Rsync: rsync server leaks arbitrary client files
First Time appeared Redhat
Redhat enterprise Linux
Redhat openshift
Weaknesses CWE-390
CPEs cpe:/a:redhat:openshift:4
cpe:/o:redhat:enterprise_linux:6
cpe:/o:redhat:enterprise_linux:7
cpe:/o:redhat:enterprise_linux:8
cpe:/o:redhat:enterprise_linux:9
Vendors & Products Redhat
Redhat enterprise Linux
Redhat openshift
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published: 2025-01-14T17:37:54.960Z

Updated: 2025-01-15T05:39:04.260Z

Reserved: 2024-12-03T08:57:58.397Z

Link: CVE-2024-12086

cve-icon Vulnrichment

Updated: 2025-01-14T18:42:03.159Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-14T18:15:25.297

Modified: 2025-01-14T22:15:26.370

Link: CVE-2024-12086

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-01-14T15:06:00Z

Links: CVE-2024-12086 - Bugzilla