NVD-CVE-2025-24366

Summary of CVE-2025-24366: Vulnerability in SFTPGo

CVE-2025-24366 is a newly identified security vulnerability in SFTPGo, an open-source, event-driven file transfer solution. This vulnerability was reported to the National Vulnerability Database (NVD) on February 7, 2025, but has not yet undergone detailed analysis. SFTPGo allows users to execute a defined set of commands over SSH, including optional commands such as rsync. In its default configuration, rsync is disabled and limited to the local filesystem, making it ineffective with cloud or remote storage backends.

The issue arises from inadequate sanitization of the client-provided rsync command. Consequently, an authenticated remote user can manipulate certain options within the rsync command to read or write files using the permissions of the SFTPGo server process. The vulnerability was addressed in version 2.6.5 of SFTPGo by implementing checks for the arguments supplied by the client. Users are urged to update to this version to mitigate the risk, as no known workarounds are available.

CVSS Metrics

The Common Vulnerability Scoring System (CVSS) metrics for this vulnerability include classifications under different versions:

  • CVSS Version 4.0, Version 3.x, and Version 2.0 are mentioned, but the specific severity scores and vectors are not provided within the summarized data.
  • For CVSS 3.1, the vector is noted as: AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H, highlighting aspects like network attack vector (AV:N), high complexity (AC:H), low privilege required (PR:L), and significant impact on confidentiality (C:H), integrity (I:H), and availability (A:H).

Weakness Enumeration

The vulnerability is categorized under the classification CWE-78, which signifies inadequate neutralization of special elements used in an operating system command, commonly termed ‘command injection’. This classification further emphasizes the nature of the vulnerability, indicating that it could allow attackers to inject commands due to improper handling of input data.

References and Recommendations

Users and administrators of SFTPGo are encouraged to consult the following resources for further details on the vulnerability:

  • The official GitHub commit log detailing the changes made in response to the identification of this vulnerability: Github Commit.
  • The advisory that outlines the security implications: GitHub Security Advisory.

Conclusion

CVE-2025-24366 represents a significant security concern for users of SFTPGo, particularly those who may rely on the rsync functionality. The vulnerability allows potential exploits that could lead to unauthorized file access or modification. Thus, timely updates to the latest version (v2.6.5 and beyond) are crucial for ensuring the integrity and security of file transfers conducted through SFTPGo. As this vulnerability has been newly introduced, further analyses and discussions in the cybersecurity community will likely follow to better assess its implications and potential mitigation strategies.

For any further inquiries or comments, users can reach out to the NVD team via the provided contact details.

Enlace de la fuente, haz clic para tener más información

Artículos y alertas de seguridad

Consultar más contenidos y alertas

Alertas y noticias de seguridad de la información

Contacta

Contacta con nosotros para obtener soluciones integrales en IT y seguridad de la información

Estamos encantados de responder cualquier pregunta que puedas tener, y ayudarte a determinar cuáles de nuestros servicios se adaptan mejor a tus necesidades.

Nuestros beneficios:
¿Qué sucede a continuación?
1

Programamos una llamada según tu conveniencia.

2

Realizamos una reunión de descubrimiento y consultoría.

3

Preparamos una propuesta.

Agenda una consulta gratuita