CVE-2025-24961

medium

Description

org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

References

https://github.com/gaul/s3proxy/security/advisories/GHSA-2ccp-vqmv-4r4x

https://github.com/gaul/s3proxy/commit/86b6ee4749aa163a78e7898efc063617ed171980

https://github.com/apache/jclouds/commit/b0819e0ef5e08c792a4d1724b938714ce9503aa3

Details

Source: Mitre, NVD

Published: 2025-02-03

Updated: 2025-02-03

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Severity: High

CVSS v4

Base Score: 6

Vector: CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Severity: Medium