Bugzilla – Bug 1099926
VUL-0: CVE-2018-12907: rclone: improper URL validation while migrating data between two storage buckets
Last modified: 2019-07-11 12:51:21 UTC
rh#1597411 In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud Storage buckets might allow attackers to trigger the transmission of any URL's content to Google, because there is no validation of a URL field received from the Google Cloud Storage API server, aka a "RESTLESS" issue. References: https://bugzilla.redhat.com/show_bug.cgi?id=1597411 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-12907 http://openwall.com/lists/oss-security/2018/06/27/3 https://www.danieldent.com/blog/restless-vulnerability-non-browser-cross-domain-http-request-attacks/
[1] is the upstream issue for this CVE. As far as I can tell, the maintainer believes that the exploitability of this issue is quite low because it requires being able to modify responses made over TLS. But they are still working on a solution AFAICS. [1]: https://github.com/ncw/rclone/issues/2376
This is automated batch bugzilla cleanup. The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such it is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please feel free to reopen this bug against that version (!you must update the "Version" component in the bug fields, do not just reopen please), or alternatively create a new ticket. Thank you for reporting this bug and we are sorry it could not be fixed during the lifetime of the release. [1] https://en.opensuse.org/Lifetime
15.0 and later are fixed