CVE-2024-52522

Rclone Improper Permission and Ownership Handling on Symlink Targets with --links and --metadata

Description

Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Insecure handling of symlinks with --links and --metadata in rclone while copying to local disk allows unprivileged users to indirectly modify ownership and permissions on symlink target files when a superuser or privileged process performs a copy. This vulnerability could enable privilege escalation and unauthorized access to critical system files, compromising system integrity, confidentiality, and availability. This vulnerability is fixed in 1.68.2.

Category

5.4
CVSS
Severity: Medium
CVSS 4.0 •
EPSS 0.02%
Affected: rclone rclone
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2024-52522?
CVE-2024-52522 has been scored as a medium severity vulnerability.
How to fix CVE-2024-52522?
To fix CVE-2024-52522, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2024-52522 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2024-52522 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2024-52522?
CVE-2024-52522 affects rclone rclone.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.