Ad

CVE-2024-12087

HIGH CVSS 3.1: 7.5 EPSS 3.19%
Updated Dec 22, 2025
Almalinux
Parameter Value
CVSS 7.5 (HIGH)
Affected Versions before 3.3.0
Fixed In 24.11
Type CWE-22 (Path Traversal)
Vendor Almalinux
Public PoC No

A path traversal vulnerability exists in rsync. It stems from behavior enabled by the `--inc-recursive` option, a default-enabled option for many client options and can be enabled by the server even if not explicitly enabled by the client. When using the `--inc-recursive` option, a lack of proper symlink verification coupled with deduplication checks occurring on a per-file-list basis could allow a server to write files outside of the client's intended destination directory.

A malicious server could write malicious files to arbitrary locations named after valid directories/paths on the client.

Attack Parameters

Attack Vector
Network
Can be exploited remotely
Attack Complexity
Low
Easy to exploit
Privileges Required
None
No privileges needed
User Interaction
None
No user interaction needed

Impact Assessment

Confidentiality
None
No data leak
Integrity
High
Complete data modification
Availability
None
No disruption

CVSS Vector v3.1

Weakness Type (CWE)

Vulnerable Products 24

Configuration From (including) Up to (excluding)
Samba Rsync
cpe:2.3:a:samba:rsync:*:*:*:*:*:*:*:*
<= 3.3.0
Almalinux Almalinux
cpe:2.3:o:almalinux:almalinux:8.0:-:*:*:*:*:*:*
Almalinux Almalinux
cpe:2.3:o:almalinux:almalinux:9.0:-:*:*:*:*:*:*
Almalinux Almalinux
cpe:2.3:o:almalinux:almalinux:10.0:-:*:*:*:*:*:*
Archlinux Arch_Linux
cpe:2.3:o:archlinux:arch_linux:-:*:*:*:*:*:*:*
Gentoo Linux
cpe:2.3:o:gentoo:linux:-:*:*:*:*:*:*:*
Nixos Nixos
cpe:2.3:o:nixos:nixos:*:*:*:*:*:*:*:*
24.11
Suse Suse_Linux
cpe:2.3:o:suse:suse_linux:-:*:*:*:*:*:*:*
Tritondatacenter Smartos
cpe:2.3:o:tritondatacenter:smartos:*:*:*:*:*:*:*:*
20250123
Redhat Enterprise_Linux
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Eus
cpe:2.3:o:redhat:enterprise_linux_eus:9.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Arm_64_Eus
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.6_aarch64:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Ibm_Z_Systems_Eus
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.6_s390x:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_For_Power_Little_Endian_Eus
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_Aus
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.6:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Server_For_Power_Little_Endian_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.6_ppc64le:*:*:*:*:*:*:*
Redhat Enterprise_Linux_Update_Services_For_Sap_Solutions
cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.6:*:*:*:*:*:*:*