rsync

Page content
  • Author: voroskoi
  • Vulnerable: 2.6.9-2
  • Unaffected: 2.6.9-3sayshell1

Two vulnerabilities have been reported in rsync, which can be exploited by malicious users to bypass certain security restrictions.

  1. An error in the rsync daemon when the “use chroot” option is disabled can be exploited to gain access to files outside of the module’s hierarchy via symlink attacks.
  2. An error exists within the enforcing of the “exclude”, “exclude from”, and “filter” options. This can be exploited to bypass access restrictions and gain access to hidden files via e.g. symlink attacks, if the filename is known.

CVEs: