CVE-2025-24961 – Amazon S3Proxy Local File Exposure Remote File System Information Disclosure

The following table lists the changes that have been made to the
CVE-2025-24961 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Feb. 03, 2025

    Action Type Old Value New Value
    Added Description org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    Added CVSS V4.0 AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-22
    Added Reference https://github.com/apache/jclouds/commit/b0819e0ef5e08c792a4d1724b938714ce9503aa3
    Added Reference https://github.com/gaul/s3proxy/commit/86b6ee4749aa163a78e7898efc063617ed171980
    Added Reference https://github.com/gaul/s3proxy/security/advisories/GHSA-2ccp-vqmv-4r4x
Share the Post:

Related Posts