org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
History

Wed, 12 Feb 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 03 Feb 2025 20:45:00 +0000

Type Values Removed Values Added
Description org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Title Insecure path traversal in filesystem and filesystem-nio2 storage backends in org.gaul S3Proxy
Weaknesses CWE-22
References
Metrics cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-02-03T20:29:17.885Z

Updated: 2025-02-12T20:51:25.069Z

Reserved: 2025-01-29T15:18:03.209Z

Link: CVE-2025-24961

cve-icon Vulnrichment

Updated: 2025-02-12T20:41:49.624Z

cve-icon NVD

Status : Received

Published: 2025-02-03T21:15:16.170

Modified: 2025-02-03T21:15:16.170

Link: CVE-2025-24961

cve-icon Redhat

No data.