Impact
The vulnerability is an authentication bypass that lets an attacker reach the authentication middleware when it interprets the percent‑encoded request URI while the bucket handler uses the decoded path, allowing the attacker to perform read, write or delete operations on S3 objects in namespaces that require authentication.
Affected Systems
Any instance of oxyno‑zeta s3‑proxy built before version 5.0.0 is affected. The product is the single vendor oxyno‑zeta’s s3‑proxy software; all releases prior to 5.0.0 contain the flaw.
Risk and Exploitability
The flaw has a CVSS score of 9.4, is not listed in CISA’s KEV catalog, and its EPSS score is not available. Attackers with network access can exploit it by issuing unauthenticated HTTP requests that use glob patterns, percent‑encoded slashes, or dot‑dot segments to target protected paths, thereby reading, writing or deleting objects without credentials.
OpenCVE Enrichment
Github GHSA