ghsa-vj7w-3m8c-6vpx
Vulnerability from github
Published
2025-02-07 20:31
Modified
2025-02-10 17:01
Severity ?
VLAI Severity ?
Summary
SFTPGo has insufficient sanitization of user provided rsync command
Details
Impact
SFTPGo supports execution of a defined set of commands via SSH. Besides a set of default commands some optional commands can be activated, one of them being rsync
: it is disabled in the default configuration and it is limited to the local filesystem, it does not work with cloud/remote storage backends.
Due to missing sanitization of the client provided rsync
command, an authenticated remote user can use some options of the rsync command to read or write files with the permissions of the SFTPGo server process.
Patches
This issue was fixed in version v2.6.5 by checking the client provided arguments.
https://github.com/drakkan/sftpgo/commit/b347ab6051f6c501da205c09315fe99cd1fa3ba1
{ "affected": [ { "database_specific": { "last_known_affected_version_range": "\u003c= 2.6.4" }, "package": { "ecosystem": "Go", "name": "github.com/drakkan/sftpgo/v2" }, "ranges": [ { "events": [ { "introduced": "0.9.5" }, { "fixed": "2.6.5" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Go", "name": "github.com/drakkan/sftpgo" }, "ranges": [ { "events": [ { "introduced": "0" }, { "last_affected": "1.2.2" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2025-24366" ], "database_specific": { "cwe_ids": [ "CWE-78" ], "github_reviewed": true, "github_reviewed_at": "2025-02-07T20:31:22Z", "nvd_published_at": "2025-02-07T22:15:14Z", "severity": "HIGH" }, "details": "### Impact\nSFTPGo supports execution of a defined set of commands via SSH. Besides a set of default commands some optional commands can be activated, one of them being `rsync`: it is disabled in the default configuration and it is limited to the local filesystem, it does not work with cloud/remote storage backends.\n\nDue to missing sanitization of the client provided `rsync` command, an authenticated remote user can use some options of the rsync command to read or write files with the permissions of the SFTPGo server process. \n\n### Patches\nThis issue was fixed in version v2.6.5 by checking the client provided arguments.\n\nhttps://github.com/drakkan/sftpgo/commit/b347ab6051f6c501da205c09315fe99cd1fa3ba1", "id": "GHSA-vj7w-3m8c-6vpx", "modified": "2025-02-10T17:01:46Z", "published": "2025-02-07T20:31:22Z", "references": [ { "type": "WEB", "url": "https://github.com/drakkan/sftpgo/security/advisories/GHSA-vj7w-3m8c-6vpx" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24366" }, { "type": "WEB", "url": "https://github.com/drakkan/sftpgo/commit/b347ab6051f6c501da205c09315fe99cd1fa3ba1" }, { "type": "PACKAGE", "url": "https://github.com/drakkan/sftpgo" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "SFTPGo has insufficient sanitization of user provided rsync command" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…