In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud Storage buckets might allow attackers to trigger the transmission of any URL's content to Google, because there is no validation of a URL field received from the Google Cloud Storage API server, aka a "RESTLESS" issue.
References
Link | Resource |
---|---|
http://openwall.com/lists/oss-security/2018/06/27/3 | Mailing List Third Party Advisory |
https://www.danieldent.com/blog/restless-vulnerability-non-browser-cross-domain-http-request-attacks/ | Mitigation Third Party Advisory |
http://openwall.com/lists/oss-security/2018/06/27/3 | Mailing List Third Party Advisory |
https://www.danieldent.com/blog/restless-vulnerability-non-browser-cross-domain-http-request-attacks/ | Mitigation Third Party Advisory |
Configurations
History
21 Nov 2024, 03:46
Type | Values Removed | Values Added |
---|---|---|
References | () http://openwall.com/lists/oss-security/2018/06/27/3 - Mailing List, Third Party Advisory | |
References | () https://www.danieldent.com/blog/restless-vulnerability-non-browser-cross-domain-http-request-attacks/ - Mitigation, Third Party Advisory |
Information
Published : 2018-06-27 13:29
Updated : 2024-11-21 03:46
NVD link : CVE-2018-12907
Mitre link : CVE-2018-12907
CVE.ORG link : CVE-2018-12907
JSON object : View
Products Affected
rclone
- rclone
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor