CVE-2024-52522

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-52522
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-52522.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-52522
Aliases
Downstream
Related
Published
2024-11-15T17:15:43Z
Modified
2025-11-04T20:33:44.574705Z
Severity
  • 5.4 (Medium) CVSS_V4 - CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L CVSS Calculator
Summary
Rclone Improper Permission and Ownership Handling on Symlink Targets with --links and --metadata
Details

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Insecure handling of symlinks with --links and --metadata in rclone while copying to local disk allows unprivileged users to indirectly modify ownership and permissions on symlink target files when a superuser or privileged process performs a copy. This vulnerability could enable privilege escalation and unauthorized access to critical system files, compromising system integrity, confidentiality, and availability. This vulnerability is fixed in 1.68.2.

Database specific
{
    "cwe_ids": [
        "CWE-281",
        "CWE-59",
        "CWE-61"
    ]
}
References

Affected packages

Git / github.com/rclone/rclone

Affected ranges

Type
GIT
Repo
https://github.com/rclone/rclone
Events

Affected versions

v1.*

v1.59.0
v1.60.0
v1.61.0
v1.62.0
v1.63.0
v1.64.0
v1.65.0
v1.66.0
v1.67.0
v1.68.0
v1.68.1