Description
Rsync version 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon's hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules by controlling the PTR record for their source IP address, allowing connections from hostnames that administrators intended to deny when reverse DNS resolution fails and defaults to UNKNOWN.
Problem types
Authentication Bypass by Alternate Name
Product status
Any version before 3.4.3
Credits
Joshua Rogers (@MegaManSec)
References
github.com/.../rsync/security/advisories/GHSA-rjfm-3w2m-jf4f
github.com/RsyncProject/rsync/releases/tag/v3.4.3
www.vulncheck.com/...rization-bypass-via-hostname-resolution