Arbitrary File Write Vulnerability in Rsync by Wayned
CVE-2022-29154

7.4HIGH

Key Information:

Vendor

Samba

Status
Vendor
CVE Published:
2 August 2022

Badges

👾 Exploit Exists🟡 Public PoC

What is CVE-2022-29154?

A vulnerability in rsync versions prior to 3.2.5 allows malicious remote servers to overwrite arbitrary files on the rsync client’s target directory. The exploit occurs due to insufficient validation of file names by the rsync client, enabling a malicious rsync server or a Man-in-The-Middle attacker to control the files sent to the client. This can lead to serious security risks, such as unauthorized access to sensitive files, including the potential compromise of the .ssh/authorized_keys file, thereby affecting the overall integrity and confidentiality of the affected systems.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2022-29154 : Arbitrary File Write Vulnerability in Rsync by Wayned