vulnerability
Amazon Linux 2023: CVE-2022-29154: Important priority package update for rsync
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:H/Au:N/C:N/I:C/A:C) | Aug 2, 2022 | Feb 17, 2025 | Feb 17, 2025 |
Severity
7
CVSS
(AV:N/AC:H/Au:N/C:N/I:C/A:C)
Published
Aug 2, 2022
Added
Feb 17, 2025
Modified
Feb 17, 2025
Description
An issue was discovered in rsync before 3.2.5 that allows malicious remote servers to write arbitrary files inside the directories of connecting peers. The server chooses which files/directories are sent to the client. However, the rsync client performs insufficient validation of file names. A malicious rsync server (or Man-in-The-Middle attacker) can overwrite arbitrary files in the rsync client target directory and subdirectories (for example, overwrite the .ssh/authorized_keys file).
A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client's rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.
A flaw was found in rsync that is triggered by a victim rsync user/client connecting to a malicious rsync server. The server can copy and overwrite arbitrary files in the client's rsync target directory and subdirectories. This flaw allows a malicious server, or in some cases, another attacker who performs a man-in-the-middle attack, to potentially overwrite sensitive files on the client machine, resulting in further exploitation.
Solution(s)
amazon-linux-2023-upgrade-rsyncamazon-linux-2023-upgrade-rsync-daemonamazon-linux-2023-upgrade-rsync-debuginfoamazon-linux-2023-upgrade-rsync-debugsource

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.