Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 659350 (CVE-2018-12907) - net-misc/rclone: data exflitration / unauthorized API use
Summary: net-misc/rclone: data exflitration / unauthorized API use
Status: RESOLVED INVALID
Alias: CVE-2018-12907
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://github.com/rclone/rclone/issu...
Whiteboard: B4 [upstream cve]
Keywords:
Depends on:
Blocks:
 
Reported: 2018-06-27 11:34 UTC by Florian Schuhmacher
Modified: 2021-08-24 20:20 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Florian Schuhmacher 2018-06-27 11:34:42 UTC
from URL:

Due to it's reliance on vulnerable upstream vendor SDKs & APIs, all current versions of 'rclone' are subject to a variety of attacks.


This vulnerability is an instance of a class of security vulnerabilities that affect a wide variety of software. Any API which has clients perform actions on arbitrary URLs chosen by the API server will lead to this class of attack becoming a concern.


Current Google Cloud Storage SDKs/APIs, Backblaze B2 APIs, and Yandex Disk APIs are affected.


Further details at: https://www.danieldent.com/blog/restless-vulnerability-non-browser-cross-domain-http-request-attacks/ 


No CVE is presently assigned.

Gentoo Security Scout
Florian Schuhmacher
Comment 1 Yury German Gentoo Infrastructure gentoo-dev 2019-04-26 23:41:18 UTC
In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud Storage buckets might allow attackers to trigger the transmission of any URL's content to Google, because there is no validation of a URL field received from the Google Cloud Storage API server, aka a "RESTLESS" issue.
Comment 2 Jason Zaman gentoo-dev 2019-04-29 14:25:55 UTC
I've dropped everything lower than 1.45
Comment 3 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-04-12 17:35:24 UTC
Replacing URL with upstream bug. We're still waiting for a fix.
Comment 4 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-07-08 01:25:02 UTC
So, upstream says:

@kuraga to exploit this you need to

    MITM https traffic or
    compromise a cloud provider


Is this really a valid issue? The upstream issue is closed after the reporter was unresponsive.
Comment 5 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2021-08-24 20:20:22 UTC
Let's close due to upstream's concerns about validity.