org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Metrics
Affected Vendors & Products
References
History
Wed, 12 Feb 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 03 Feb 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
Title | Insecure path traversal in filesystem and filesystem-nio2 storage backends in org.gaul S3Proxy | |
Weaknesses | CWE-22 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-02-03T20:29:17.885Z
Updated: 2025-02-12T20:51:25.069Z
Reserved: 2025-01-29T15:18:03.209Z
Link: CVE-2025-24961

Updated: 2025-02-12T20:41:49.624Z

Status : Received
Published: 2025-02-03T21:15:16.170
Modified: 2025-02-03T21:15:16.170
Link: CVE-2025-24961

No data.