Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-0217 | org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. |
Github GHSA |
GHSA-2ccp-vqmv-4r4x | S3Proxy allows insecure path traversal in filesystem and filesystem-nio2 storage backends |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 12 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 03 Feb 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. | |
| Title | Insecure path traversal in filesystem and filesystem-nio2 storage backends in org.gaul S3Proxy | |
| Weaknesses | CWE-22 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-12T20:51:25.069Z
Reserved: 2025-01-29T15:18:03.209Z
Link: CVE-2025-24961
Updated: 2025-02-12T20:41:49.624Z
Status : Received
Published: 2025-02-03T21:15:16.170
Modified: 2025-02-03T21:15:16.170
Link: CVE-2025-24961
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA