Plattform
rust
Komponente
rustfs
Behoben in
1.0.1
1.0.0-alpha.79
CVE-2025-68705 represents a critical Path Traversal vulnerability discovered in rustfs. This flaw allows attackers to potentially read or write arbitrary files on the system, compromising data integrity and confidentiality. The vulnerability stems from inadequate path validation within the /rustfs/rpc/readfilestream endpoint and impacts versions of rustfs before 1.0.0-alpha.79. A fix has been released in version 1.0.0-alpha.79.
The core of this vulnerability lies in the lack of proper sanitization of file paths within the crates/ecstore/src/disk/local.rs:1791 file. Specifically, the code directly joins the provided path with the volume directory without validating its contents. This allows an attacker to craft a malicious path, such as ../../../../etc/passwd, to traverse outside the intended directory and access sensitive files. Successful exploitation could lead to the disclosure of confidential data, modification of system files, or even remote code execution depending on file permissions and the application's context. The potential impact is significant, mirroring the risks associated with traditional path traversal vulnerabilities where attackers can bypass security controls and gain unauthorized access to system resources.
While no public exploits have been reported as of the publication date, the vulnerability's severity (estimated CVSS 9.9) and ease of exploitation suggest a potential for active exploitation. The lack of robust path validation is a common attack vector, and the potential for arbitrary file read/write makes this a high-priority vulnerability. It is recommended to monitor for suspicious activity and implement the mitigation steps outlined above.
Systems utilizing rustfs for file storage or data access are at risk, particularly those with exposed RPC endpoints. Environments with legacy configurations or those lacking robust access controls are especially vulnerable. Shared hosting environments where multiple users share the same rustfs instance are also at increased risk.
• rust: Examine logs for requests to /rustfs/rpc/readfilestream containing path traversal sequences (e.g., ../).
• generic web: Use curl to test the endpoint with various path traversal payloads: curl 'http://<rustfsendpoint>/rustfs/rpc/readfile_stream?path=../../../../etc/passwd'
• generic web: Monitor access logs for unusual file access patterns originating from the /rustfs/rpc/readfilestream endpoint.
• generic web: Check for unexpected files appearing in the rustfs data directory.
disclosure
Exploit-Status
EPSS
0.04% (13% Perzentil)
CISA SSVC
The primary mitigation for CVE-2025-68705 is to immediately upgrade to RustFS version 1.0.0-alpha.79 or later. If upgrading is not immediately feasible, consider implementing a Web Application Firewall (WAF) rule to filter requests containing suspicious path characters (e.g., .., /). Additionally, restrict access to the /rustfs/rpc/readfilestream endpoint to trusted clients only. Review and harden file system permissions to minimize the potential impact of a successful attack. After upgrading, confirm the fix by attempting to access files outside the intended directory via the /rustfs/rpc/readfilestream endpoint; access should be denied.
Actualice RustFS a la versión 1.0.0-alpha.79 o superior. Esta versión contiene la corrección para la vulnerabilidad de path traversal. La actualización se puede realizar mediante el sistema de gestión de paquetes de Rust, Cargo.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-68705 is a Path Traversal vulnerability in rustfs, allowing attackers to potentially read or write arbitrary files due to insufficient path validation in the /rustfs/rpc/readfilestream endpoint.
You are affected if you are using a version of rustfs prior to 1.0.0-alpha.79. Assess your environment to determine if you are using a vulnerable version.
Upgrade to rustfs version 1.0.0-alpha.79 or later to address the path validation issue. Consider implementing WAF rules as a temporary mitigation.
While no active exploitation has been publicly confirmed, the vulnerability's ease of exploitation and potential impact make it a high-priority concern.
Refer to the rustfs project's official communication channels and security advisories for the latest information regarding CVE-2025-68705.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Cargo.lock-Datei hoch und wir sagen dir sofort, ob du betroffen bist.