When copying files with rsync, octorpki uses the "-a" flag 0, which forces rsync to copy binaries with the suid bit set as root. Since the provided service definition defaults to root ( https://github.com/cloudflare/cfrpki/blob/master/package/octorpki.service ) this could allow for a vector, when combined with another vulnerability that causes octorpki to process a malicious TAL file, for a local privilege escalation.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 29 Jan 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | When copying files with rsync, octorpki uses the "-a" flag 0, which forces rsync to copy binaries with the suid bit set as root. Since the provided service definition defaults to root ( https://github.com/cloudflare/cfrpki/blob/master/package/octorpki.service ) this could allow for a vector, when combined with another vulnerability that causes octorpki to process a malicious TAL file, for a local privilege escalation. | |
Title | Improper Preservation of Permissions in github.com/cloudflare/cfrpki/cmd/octorpki | |
Weaknesses | CWE-269 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cloudflare
Published: 2025-01-29T10:00:53.237Z
Updated: 2025-02-12T16:03:40.405Z
Reserved: 2021-11-18T20:10:42.977Z
Link: CVE-2021-3978

Updated: 2025-02-12T16:03:34.945Z

Status : Received
Published: 2025-01-29T10:15:07.750
Modified: 2025-01-29T10:15:07.750
Link: CVE-2021-3978

No data.