Cyber Posture

CVE-2024-12088

Medium

Published: 14 January 2025

Published
14 January 2025
Modified
14 April 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
EPSS Score 0.0289 86.4th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may upload tools to third-party or adversary controlled infrastructure to make it accessible during targeting.

Security Summary

CVE-2024-12088 is a path traversal vulnerability (CWE-22) in the rsync client. When the --safe-links option is used, the client fails to properly verify if a symbolic link destination sent from the server contains another symbolic link within it. This flaw may lead to arbitrary file writes outside the desired directory. The vulnerability has a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N) and was published on 2025-01-14.

A remote attacker with no privileges can exploit this vulnerability by controlling an rsync server and sending specially crafted symbolic links to a client using the --safe-links option during a file transfer. Exploitation requires user interaction, such as initiating the rsync client command to pull files from the malicious server. Successful attacks allow the attacker to achieve high-impact integrity violations by writing files to arbitrary locations on the client's filesystem.

Red Hat has issued multiple advisories addressing this issue, including RHBA-2025:6470, RHSA-2025:2600, RHSA-2025:7050, and RHSA-2025:8385. Further details on the vulnerability and mitigations are available at https://access.redhat.com/security/cve/CVE-2024-12088.

Details

CWE(s)
CWE-22

Affected Products

samba
rsync
≤ 3.3.0
redhat
discovery
1.14
redhat
openshift container platform
4.0
redhat
enterprise linux
10.0, 6.0, 7.0, 8.0, 9.0
redhat
enterprise linux eus
9.6
redhat
enterprise linux for arm 64
8.0_aarch64, 9.0_aarch64
redhat
enterprise linux for arm 64 eus
9.6_aarch64
redhat
enterprise linux for ibm z systems
8.0_s390x, 9.0_s390x
redhat
enterprise linux for ibm z systems eus
9.6_s390x
redhat
enterprise linux for power little endian
8.0_ppc64le, 9.0_ppc64le
+10 more product configuration(s) — see NVD for full list

MITRE ATT&CK Enterprise Techniques

T1105 Ingress Tool Transfer Command And Control
Adversaries may transfer tools or other files from an external system into a compromised environment.
T1608.001 Upload Malware Resource Development
Adversaries may upload malware to third-party or adversary controlled infrastructure to make it accessible during targeting.
T1608.002 Upload Tool Resource Development
Adversaries may upload tools to third-party or adversary controlled infrastructure to make it accessible during targeting.
Why these techniques?

The path traversal vulnerability in the rsync client (bypassing --safe-links via nested symlinks) allows a malicious rsync server to write arbitrary files outside the intended directory, enabling ingress tool transfer and staging of malware/tools on the victim system.

References