Vulnerability Description
In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud Storage buckets might allow attackers to trigger the transmission of any URL's content to Google, because there is no validation of a URL field received from the Google Cloud Storage API server, aka a "RESTLESS" issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rclone | Rclone | 1.42 |
Related Weaknesses (CWE)
References
- http://openwall.com/lists/oss-security/2018/06/27/3Mailing ListThird Party Advisory
- https://www.danieldent.com/blog/restless-vulnerability-non-browser-cross-domain-MitigationThird Party Advisory
- http://openwall.com/lists/oss-security/2018/06/27/3Mailing ListThird Party Advisory
- https://www.danieldent.com/blog/restless-vulnerability-non-browser-cross-domain-MitigationThird Party Advisory
FAQ
What is CVE-2018-12907?
CVE-2018-12907 is a vulnerability with a CVSS score of 7.5 (HIGH). In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud Storage buckets might allow attackers to trigger the transmission of any URL's content to Google, because there is no vali...
How severe is CVE-2018-12907?
CVE-2018-12907 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-12907?
Check the references section above for vendor advisories and patch information. Affected products include: Rclone Rclone.