Cyber Posture

CVE-2024-12087

MediumPublic PoC

Published: 14 January 2025

Published
14 January 2025
Modified
14 April 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
EPSS Score 0.0319 87.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may exploit software vulnerabilities in client applications to execute code.

Security Summary

CVE-2024-12087 is a path traversal vulnerability (CWE-22) in rsync, published on 2025-01-14. The issue arises from the --inc-recursive option, which is default-enabled for many client configurations and can be enabled by the server even if not explicitly requested by the client. When this option is in use, inadequate symlink verification combined with deduplication checks performed on a per-file-list basis allows a server to write files outside the client's intended destination directory to arbitrary locations named after valid client directories or paths.

A malicious rsync server can exploit this vulnerability against a client connecting to it, provided the --inc-recursive option is active. The attack requires no privileges (PR:N) and low complexity (AC:L) over the network (AV:N), but involves user interaction (UI:R), with a CVSS v3.1 base score of 6.5 (C:N/I:H/A:N/S:U). Successful exploitation enables the server to write malicious files to arbitrary locations on the client filesystem.

Red Hat has released multiple errata addressing this vulnerability, including RHBA-2025:6470, RHSA-2025:23154, RHSA-2025:23235, RHSA-2025:23407, and RHSA-2025:23415.

Details

CWE(s)
CWE-22

Affected Products

samba
rsync
≤ 3.3.0
almalinux
almalinux
10.0, 8.0, 9.0
archlinux
arch linux
all versions
gentoo
linux
all versions
nixos
nixos
≤ 24.11
suse
suse linux
all versions
tritondatacenter
smartos
≤ 20250123
redhat
enterprise linux
8.0, 9.0
redhat
enterprise linux eus
9.6
redhat
enterprise linux for arm 64
8.0_aarch64, 9.0_aarch64
+8 more product configuration(s) — see NVD for full list

MITRE ATT&CK Enterprise Techniques

T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
Why these techniques?

The path traversal and symlink handling vulnerabilities (CVE-2024-12087, CVE-2024-12088, CVE-2024-12747) in rsync allow a malicious server to write arbitrary files outside the intended client destination directory, facilitating ingress tool transfer (T1105) and exploitation of the rsync client application for potential execution of dropped malicious payloads (T1203).

References