Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42882— oxyno-zeta/s3-proxy: Security Issues in Resource Path Matching

CVSS 9.4 · Critical EPSS 0.15% · P35

Affected Version Matrix 1

VendorProductVersion RangeStatus
oxyno-zetas3-proxy< 5.0.0affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42882

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
oxyno-zeta/s3-proxy: Security Issues in Resource Path Matching
Source: NVD (National Vulnerability Database)
Vulnerability Description
oxyno-zeta/s3-proxy is an aws s3 proxy written in go. Prior to 5.0.0, s3-proxy contains an authentication bypass caused by inconsistent URL path interpretation between the authentication middleware and the bucket handler. The authentication middleware evaluates resource path patterns against the percent-encoded request URI (r.URL.RequestURI()), while the bucket handler constructs S3 object keys from the decoded path (r.URL.Path). This mismatch, combined with the glob library being invoked without a path separator (causing * to match across / boundaries), allows unauthenticated attackers to write to, read from, or delete objects in protected S3 namespaces. Exploitation is possible via three techniques: (1) using * patterns that match across path separators to reach protected routes via path traversal (e.g., /open/foo/drafts/../restricted/), (2) using percent-encoded slashes (%2F) to collapse multiple path segments into a single token at the auth layer while the decoded form resolves to a protected namespace at the storage layer, and (3) using dot-dot segments (../) under ** prefix patterns, where the raw path matches an open route while Go's URL parser resolves the traversal to a protected path before the bucket handler runs. An unauthenticated attacker with network access can perform unauthorized PUT, GET, or DELETE operations on objects in authentication-protected S3 namespaces. This vulnerability is fixed in 5.0.0.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Source: NVD (National Vulnerability Database)
Vulnerability Title
s3-proxy 路径遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
s3-proxy是Havrileck Alexandre个人开发者的一个多功能的S3存储桶代理工具。 s3-proxy 5.0.0之前版本存在路径遍历漏洞,该漏洞源于身份验证中间件与存储桶处理器之间URL路径解释不一致,导致身份验证绕过,允许未经身份验证的攻击者对受保护的S3命名空间执行未经授权的写入、读取或删除操作。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
oxyno-zetas3-proxy < 5.0.0 -

II. Public POCs for CVE-2026-42882

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42882

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-42882

No comments yet


Leave a comment