rsync Path Traversal Vulnerability

MEDIUM (6.5) No Patch (336 days)

Threat Intelligence

Low Risk
EPSS Score: 2.98% chance of exploitation (percentile: 86%)
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Rsync is a popular command-line utility for synchronizing files between two locations. It's commonly used in various Linux distributions and server environments to manage file copies. The vulnerability in rsync allows an attacker to write malicious files to arbitrary locations on the client system, potentially leading to data corruption or unauthorized access.

Am I affected?

You're affected if you use rsync versions 3.1.0-1 to 3.2.9.
Check with: rsync --version and look for the --inc-recursive option in the output.

Note: Rsync is a command-line tool, so it's not typically used directly by end-users. However, system administrators and developers who use rsync might be affected.

Affected Products

GNU Project / rsync

How to fix

  1. Upgrade to rsync version 3.2.10 or later from the official Ubuntu repositories.
  2. For Debian-based systems: sudo apt-get update && sudo apt-get install rsync
  3. Alternatively, you can disable the --inc-recursive option by setting the RSYNC_IGNORE_EMPTY DirecTORY environment variable to /true.
  4. For most Linux distributions: export RSYNC_IGNORE_EMPTY_DIRCTORY=true