Rsync Daemon File Handling Vulnerability in Rsync by Rsync Project
CVE-2026-29518
7.3HIGH
What is CVE-2026-29518?
Rsync versions prior to 3.4.3 are susceptible to a time-of-check to time-of-use (TOCTOU) race condition in the handling of daemon file operations. This vulnerability allows an attacker, who has write permissions to a module path, to exploit the race condition to redirect file writes to unintended directories. By replacing components of the parent directory with symbolic links, the attacker can create or overwrite arbitrary files. Should the daemon operate with elevated privileges and the chroot setting be disabled, this manipulation can potentially modify sensitive system files and lead to privilege escalation.
Affected Version(s)
rsync 0 < 3.4.3
References
CVSS V4
Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Nullx3D (Batuhan SANCAK)
Michael Stapelberg
Damien Neil
