Rclone における情報漏えいに関する脆弱性
| Title |
Rclone における情報漏えいに関する脆弱性
|
| Summary |
Rclone には、情報漏えいに関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
June 26, 2018, midnight |
| Registration Date |
Sept. 20, 2018, 3:56 p.m. |
| Last Update |
Sept. 20, 2018, 3:56 p.m. |
|
CVSS3.0 : 重要
|
| Score |
7.5
|
| Vector |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
|
CVSS2.0 : 警告
|
| Score |
5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
Affected System
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2018年09月20日] 掲載 |
Sept. 20, 2018, 3:56 p.m. |
NVD Vulnerability Information
CVE-2018-12907
| Summary |
In Rclone 1.42, use of "rclone sync" to migrate data between two Google Cloud Storage buckets might allow attackers to trigger the transmission of any URL's content to Google, because there is no validation of a URL field received from the Google Cloud Storage API server, aka a "RESTLESS" issue.
|
| Publication Date |
June 27, 2018, 10:29 p.m. |
| Registration Date |
March 1, 2021, 6:51 p.m. |
| Last Update |
Nov. 21, 2024, 12:46 p.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:rclone:rclone:1.42:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List