<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Rsync (&lt; 3.4.3) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/rsync--3.4.3/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 13:17:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/rsync--3.4.3/feed.xml" rel="self" type="application/rss+xml"/><item><title>Rsync TOCTOU Vulnerability Allows File Write Redirection</title><link>https://feed.craftedsignal.io/briefs/2026-05-rsync-toctou/</link><pubDate>Wed, 20 May 2026 13:17:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-rsync-toctou/</guid><description>Rsync versions before 3.4.3 are vulnerable to a TOCTOU race condition allowing attackers with write access to a module path to redirect file writes outside intended directories by replacing parent directory components with symbolic links, potentially leading to privilege escalation when the daemon runs with elevated privileges and chroot is disabled.</description><content:encoded><![CDATA[<p>Rsync before version 3.4.3 is susceptible to a time-of-check to time-of-use (TOCTOU) race condition in how the daemon handles files. This vulnerability allows an attacker with write access to a Rsync module path to manipulate file writes. By replacing parent directory components with symbolic links, an attacker can redirect file writes to locations outside of the intended directories. The vulnerability is triggered when the chroot setting is false. This can lead to arbitrary file creation or overwriting, and potentially escalate privileges if the Rsync daemon runs with elevated permissions. This vulnerability was published in May 2026 and is identified as CVE-2026-29518.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains write access to a Rsync module path, either through compromised credentials or misconfiguration.</li>
<li>Attacker identifies a target file or location outside of the intended module path.</li>
<li>Attacker crafts a malicious directory structure within the Rsync module path, replacing parent directories with symbolic links pointing to attacker-controlled locations.</li>
<li>Attacker initiates a file transfer operation using Rsync, targeting a file within the crafted malicious directory structure.</li>
<li>Rsync daemon performs initial checks on the directory structure.</li>
<li>Between the check and the actual file write, the attacker modifies the symbolic links to redirect the write operation to the target file or location outside of the Rsync module path.</li>
<li>Rsync daemon writes the file to the attacker-specified location, bypassing intended access controls.</li>
<li>If the attacker overwrites sensitive system files, this can lead to privilege escalation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to create or overwrite arbitrary files on the system, potentially leading to privilege escalation if the Rsync daemon is running with elevated privileges. If the attacker overwrites critical system binaries or configuration files, they can gain complete control of the system. The impact is limited to systems where the chroot setting is false.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Rsync to version 3.4.3 or later to patch CVE-2026-29518.</li>
<li>Apply the &ldquo;Detect Rsync TOCTOU Attempt via Symlink Creation&rdquo; and &ldquo;Detect Rsync TOCTOU Attempt via File Modification&rdquo; Sigma rules to identify potential exploitation attempts.</li>
<li>Ensure the chroot setting is enabled in Rsync configurations to mitigate the vulnerability.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>privilege-escalation</category><category>toctou</category><category>rsync</category></item></channel></rss>