CVE-2026-27607
EUVD-2026-858825.02.2026, 03:16
RustFS is a distributed object storage system built in Rust. In versions 1.0.0-alpha.56 through 1.0.0-alpha.82, RustFS does not validate policy conditions in presigned POST uploads (PostObject), allowing attackers to bypass content-length-range, starts-with, and Content-Type constraints. This enables unauthorized file uploads exceeding size limits, uploads to arbitrary object keys, and content-type spoofing, potentially leading to storage exhaustion, unauthorized data access, and security bypasses. Version 1.0.0-alpha.83 fixes the issue.Enginsight
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| rustfs | rustfs | 1.0.0:alpha56 |
| rustfs | rustfs | 1.0.0:alpha57 |
| rustfs | rustfs | 1.0.0:alpha58 |
| rustfs | rustfs | 1.0.0:alpha59 |
| rustfs | rustfs | 1.0.0:alpha60 |
| rustfs | rustfs | 1.0.0:alpha61 |
| rustfs | rustfs | 1.0.0:alpha62 |
| rustfs | rustfs | 1.0.0:alpha63 |
| rustfs | rustfs | 1.0.0:alpha64 |
| rustfs | rustfs | 1.0.0:alpha65 |
| rustfs | rustfs | 1.0.0:alpha66 |
| rustfs | rustfs | 1.0.0:alpha67 |
| rustfs | rustfs | 1.0.0:alpha68 |
| rustfs | rustfs | 1.0.0:alpha69 |
| rustfs | rustfs | 1.0.0:alpha70 |
| rustfs | rustfs | 1.0.0:alpha71 |
| rustfs | rustfs | 1.0.0:alpha72 |
| rustfs | rustfs | 1.0.0:alpha73 |
| rustfs | rustfs | 1.0.0:alpha74 |
| rustfs | rustfs | 1.0.0:alpha75 |
| rustfs | rustfs | 1.0.0:alpha76 |
| rustfs | rustfs | 1.0.0:alpha77 |
| rustfs | rustfs | 1.0.0:alpha78 |
| rustfs | rustfs | 1.0.0:alpha79 |
| rustfs | rustfs | 1.0.0:alpha80 |
| rustfs | rustfs | 1.0.0:alpha81 |
| rustfs | rustfs | 1.0.0:alpha82 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.