Bug 1099926 (CVE-2018-12907) - VUL-0: CVE-2018-12907: rclone: improper URL validation while migrating data between two storage buckets
Summary: VUL-0: CVE-2018-12907: rclone: improper URL validation while migrating data b...
Status: RESOLVED WONTFIX
Alias: CVE-2018-12907
Product: openSUSE Distribution
Classification: openSUSE
Component: Other (show other bugs)
Version: Leap 42.3
Hardware: Other Other
: P3 - Medium : Normal (vote)
Target Milestone: ---
Assignee: Aleksa Sarai
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/209052/
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2018-07-03 05:46 UTC by Marcus Meissner
Modified: 2019-07-11 12:51 UTC (History)
0 users

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2018-07-03 05:46:17 UTC
rh#1597411

In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud
Storage buckets might allow attackers to trigger the transmission of any URL's
content to Google, because there is no validation of a URL field received from
the Google Cloud Storage API server, aka a "RESTLESS" issue.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1597411
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-12907
http://openwall.com/lists/oss-security/2018/06/27/3
https://www.danieldent.com/blog/restless-vulnerability-non-browser-cross-domain-http-request-attacks/
Comment 1 Aleksa Sarai 2018-07-04 13:26:44 UTC
[1] is the upstream issue for this CVE. As far as I can tell, the maintainer believes that the exploitability of this issue is quite low because it requires being able to modify responses made over TLS. But they are still working on a solution AFAICS.

[1]: https://github.com/ncw/rclone/issues/2376
Comment 2 Tomáš Chvátal 2019-07-11 11:32:36 UTC
This is automated batch bugzilla cleanup.

The openSUSE 42.3 changed to end-of-life (EOL [1]) status. As such
it is no longer maintained, which means that it will not receive any
further security or bug fix updates.
As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of 
openSUSE (At this moment openSUSE Leap 15.1, 15.0 and Tumbleweed) please
feel free to reopen this bug against that version (!you must update the
"Version" component in the bug fields, do not just reopen please), or
alternatively create a new ticket.

Thank you for reporting this bug and we are sorry it could not be fixed
during the lifetime of the release.

[1] https://en.opensuse.org/Lifetime
Comment 3 Marcus Meissner 2019-07-11 12:51:21 UTC
15.0 and later are fixed