CVE-2025-24366

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-24366
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-24366.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-24366
Aliases
Related
Published
2025-02-07T22:15:14Z
Modified
2025-02-08T08:53:50.295723Z
Summary
[none]
Details

SFTPGo is an open source, event-driven file transfer solution. SFTPGo supports execution of a defined set of commands via SSH. Besides a set of default commands some optional commands can be activated, one of them being rsync. It is disabled in the default configuration and it is limited to the local filesystem, it does not work with cloud/remote storage backends. Due to missing sanitization of the client provided rsync command, an authenticated remote user can use some options of the rsync command to read or write files with the permissions of the SFTPGo server process. This issue was fixed in version v2.6.5 by checking the client provided arguments. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

Affected packages

Git / github.com/drakkan/sftpgo

Affected ranges

Type
GIT
Repo
https://github.com/drakkan/sftpgo
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*

0.9.1
0.9.2
0.9.3
0.9.4
0.9.5
0.9.6

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.2.0
v1.2.1
v1.2.2

v2.*

v2.0.0
v2.0.1
v2.0.2
v2.1.0
v2.2.0
v2.2.1
v2.3.0
v2.4.0
v2.5.0
v2.5.1
v2.6.0
v2.6.1
v2.6.2
v2.6.3
v2.6.4