Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 2 Aug 2022 11:53:25 +0300
From: EGE BALCI <>
Subject: CVE-2022-29154: Rsync client-side arbitrary file write vulnerability.

Date reported           : July 25, 2022
CVE identifiers         : CVE-2022-29154.
Rsync client-side arbitrary file write vulnerability. (CVE-2022-29154)

 >>>> We have discovered a critical arbitrary file write vulnerability 
in the
 >>>> rsync utility that allows malicious remote servers to write arbitrary
 >>>> files inside the directories of connecting peers. The server chooses
 >>>> which files/directories are sent to the client. Due to the 
 >>>> controls inside the
 >>>> [do_server_recv](
 >>> )
 >>>> function, a malicious rysnc server (or Man-in-The-Middle attacker) can
 >>>> overwrite arbitrary files in the rsync client target directory and
 >>>> subdirectories. An attacker abusing this vulnerability can overwrite
 >>>> critical files under the target rsync directory and subdirectories 
 >>>> example, to overwrite the .ssh/authorized_keys file). This issue 
is very
 >>>> similar with the
 >>>> [CVE-2019-6111](
 >>>> Best regards, Ege BALCI, Taha HAMAD.

The vulnerability was addressed with the developer of the rsync project 
and necessary patches are made. Related commit and details can be found 
in the following links,

We recommend updating to the latest stable versions of rsync.

Threat Intelligence Team Lead

*PRODAFT Cyber Security Technologies INC.*
*CH:* Y-Parc, rue Galilée 7, 1400 Yverdon-les-Bains, Switzerland
*NL:* Wilhelmina van Pruisenweg 104, 2595 AN Den Haag, Netherlands

In case you think you’re not the designated recipient of the e-mail 
hereby; please delete it accordingly. *This e-mail may have been sent 
from a mobile device. Please contact me from my mobile, in case you 
notice an error in the content. PS. Feel free to contact me via Signal, 
Threema or Telegram; or ask for my public PGP key for high-profile cases 
that may require higher confidentiality.

Content of type "text/html" skipped

Download attachment "OpenPGP_0xCDCA0F4B4445AA39.asc" of type "application/pgp-keys" (649 bytes)

Download attachment "OpenPGP_signature" of type "application/pgp-signature" (237 bytes)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.