In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for RHEL:7
rsync
.
Note: Versions mentioned in the description apply only to the upstream rsync
package and not the rsync
package as distributed by RHEL
.
See How to fix?
for RHEL:7
relevant fixed versions and status.
A path traversal vulnerability exists in rsync. It stems from behavior enabled by the --inc-recursive
option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the --inc-recursive
option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory. A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.