CVE-2026-43617 PUBLISHED

Rsync < 3.4.3 Authorization Bypass via Hostname Resolution

Assigner: VulnCheck
Reserved: 01.05.2026 Published: 20.05.2026 Updated: 20.05.2026

Rsync version 3.4.2 and prior contain an authorization bypass vulnerability in the rsync daemon's hostname-based access control list enforcement when configured with chroot. Attackers can bypass hostname-based deny rules by controlling the PTR record for their source IP address, allowing connections from hostnames that administrators intended to deny when reverse DNS resolution fails and defaults to UNKNOWN.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
CVSS Score: 6.3

Product Status

Vendor RsyncProject
Product rsync
Versions Default: unaffected
  • affected from 0 to 3.4.3 (excl.)

Credits

  • Joshua Rogers (@MegaManSec) finder

References

Problem Types

  • Authentication Bypass by Alternate Name CWE