Description
org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Problem types
CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
References
github.com/...3proxy/security/advisories/GHSA-2ccp-vqmv-4r4x
github.com/...ommit/b0819e0ef5e08c792a4d1724b938714ce9503aa3
github.com/...ommit/86b6ee4749aa163a78e7898efc063617ed171980