In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud Storage buckets might allow attackers to trigger the transmission of any URL's content to Google, because there is no validation of a URL field received from the Google Cloud Storage API server, aka a "RESTLESS" issue.
References
Link | Resource |
---|---|
https://www.danieldent.com/blog/restless-vulnerability-non-browser-cross-domain-http-request-attacks/ | Mitigation Third Party Advisory |
http://openwall.com/lists/oss-security/2018/06/27/3 | Mailing List Third Party Advisory |
Configurations
Information
Published : 2018-06-27 06:29
Updated : 2018-08-31 09:10
NVD link : CVE-2018-12907
Mitre link : CVE-2018-12907
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
rclone
- rclone