CVE-2018-12907
Summary
| CVE | CVE-2018-12907 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-06-27 13:29:00 UTC |
| Updated | 2018-08-31 16:10:00 UTC |
| Description | In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud Storage buckets might allow attackers to trigger the transmission of any URL's content to Google, because there is no validation of a URL field received from the Google Cloud Storage API server, aka a "RESTLESS" issue. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| oss-security - rclone data exflitration / unauthorized API use | MISC | openwall.com | Mailing List, Third Party Advisory |
| The RESTLESS Vulnerability: Non-Browser Based Cross-Domain HTTP Request Attacks - Daniel Dent | MISC | www.danieldent.com | Mitigation, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.