RustFS contains a missing authorization check in the multipart copy path (UploadPartCopy). A low-privileged user who cannot read objects from a victim bucket can still exfiltrate victim objects by copying them into an attacker-controlled multipart upload and completing the upload.
This breaks tenant isolation in multi-user / multi-tenant deployments.
Impact
Unauthorized cross-bucket / cross-tenant data exfiltration (Confidentiality: High).
An attacker with only minimal permissions on their own bucket (multipart upload + Put/Get on destination objects) can copy and retrieve objects from a victim bucket without having s3:GetObject (or equivalent) permission on the source.
In the attached PoC, the attacker successfully exfiltrates a 5MB private object and proves integrity via matching SHA256 and size.
Threat Model (Realistic)
- Victim tenant/user owns a bucket (e.g.,
victim-bucket-*) and stores private objects (e.g., private/finance_dump.bin).
- Attacker tenant/user has no permissions on the victim bucket:
- cannot
ListObjects, HeadObject, GetObject, or CopyObject from the victim bucket.
- Attacker has minimal permissions only on attacker bucket:
CreateMultipartUpload, UploadPart, UploadPartCopy, CompleteMultipartUpload, AbortMultipartUpload,
- and
PutObject/GetObject for objects in attacker bucket.
- Despite this, attacker can exfiltrate victim objects via multipart copy.
Root Cause Analysis
The access control layer fails open for multipart copy-related operations:
File: rustfs/src/storage/access.rs
abort_multipart_upload() returns Ok(()) without authorization (L435–437)
complete_multipart_upload() returns Ok(()) without authorization (L442–444)
upload_part_copy() returns Ok(()) without authorization (L1446–1448)
In contrast, copy_object() correctly enforces authorization:
- source
GetObject authorization (L469)
- destination
PutObject authorization (L478)
The multipart copy implementation reads the source object directly:
File: rustfs/src/app/multipart_usecase.rs
store.get_object_reader(&src_bucket, &src_key, ...) (L959–962)
Because upload_part_copy() does not enforce source GetObject authorization, the server reads and copies victim data even when the requester lacks permission.
Affected Versions
- Tested vulnerable on:
main @ c1d5106acc3480c275a52344df84633bb6dcd8f0
- Git describe:
1.0.0-alpha.86-3-gc1d5106a
The fail-open authorization behavior for UploadPartCopy was introduced in:
- Commit:
09ea11c13 (per git blame on rustfs/src/storage/access.rs:1443-1448)
Affected range (recommended wording):
- All versions from commit
09ea11c13 through c1d5106acc3480c275a52344df84633bb6dcd8f0 (and likely any releases containing those commits) until a fix is applied.
Package version (Cargo metadata)
rustfs crate version in this tree: 0.0.5 (cargo metadata)
Proof of Concept (PoC) – Real Commands + Verified Results
Files
Place the PoC script at the repository root:
Environment
RustFS running locally (Docker is simplest), listening on:
Tools:
Steps to Reproduce
- Start RustFS (example):
docker compose -f docker-compose-simple.yml up -d
- Run the PoC and save output:
chmod +x poc_uploadpartcopy_exfil_v3.sh
./poc_uploadpartcopy_exfil_v3.sh | tee poc_v3_output.txt
Attachments
Expected Behavior
Actual Behavior
- All direct operations against victim are denied (as expected),
- but
UploadPartCopy succeeds, and attacker retrieves the copied object from attacker bucket.
Observed PoC Output
Victim uploads a private object:
- size:
5,242,880 bytes
- sha256:
fda018db1da9d8f4c1b287c75943384a3b4ede391ec156039b6d94e17d6ad68f
Attacker exfiltrates it via multipart copy:
- stolen size:
5,242,880 bytes
- stolen sha256:
fda018db1da9d8f4c1b287c75943384a3b4ede391ec156039b6d94e17d6ad68f
Proof:
- hashes and sizes match (victim == stolen) -> unauthorized cross-bucket read confirmed.
Network Evidence (Redacted)
The debug log shows a successful request with:
- HTTP method:
PUT
- destination:
/<attacker-bucket>/<dst-key>?partNumber=1&uploadId=...
- header:
x-amz-copy-source: <victim-bucket>/private/finance_dump.bin
- response:
HTTP/1.1 200 with <CopyPartResult><ETag>...</ETag>...</CopyPartResult>
Fix
Implement authorization checks equivalent to copy_object() for multipart copy paths:
References
RustFS contains a missing authorization check in the multipart copy path (
UploadPartCopy). A low-privileged user who cannot read objects from a victim bucket can still exfiltrate victim objects by copying them into an attacker-controlled multipart upload and completing the upload.This breaks tenant isolation in multi-user / multi-tenant deployments.
Impact
Unauthorized cross-bucket / cross-tenant data exfiltration (Confidentiality: High).
An attacker with only minimal permissions on their own bucket (multipart upload + Put/Get on destination objects) can copy and retrieve objects from a victim bucket without having
s3:GetObject(or equivalent) permission on the source.In the attached PoC, the attacker successfully exfiltrates a 5MB private object and proves integrity via matching SHA256 and size.
Threat Model (Realistic)
victim-bucket-*) and stores private objects (e.g.,private/finance_dump.bin).ListObjects,HeadObject,GetObject, orCopyObjectfrom the victim bucket.CreateMultipartUpload,UploadPart,UploadPartCopy,CompleteMultipartUpload,AbortMultipartUpload,PutObject/GetObjectfor objects in attacker bucket.Root Cause Analysis
The access control layer fails open for multipart copy-related operations:
File:
rustfs/src/storage/access.rsabort_multipart_upload()returnsOk(())without authorization (L435–437)complete_multipart_upload()returnsOk(())without authorization (L442–444)upload_part_copy()returnsOk(())without authorization (L1446–1448)In contrast,
copy_object()correctly enforces authorization:GetObjectauthorization (L469)PutObjectauthorization (L478)The multipart copy implementation reads the source object directly:
File:
rustfs/src/app/multipart_usecase.rsstore.get_object_reader(&src_bucket, &src_key, ...)(L959–962)Because
upload_part_copy()does not enforce sourceGetObjectauthorization, the server reads and copies victim data even when the requester lacks permission.Affected Versions
main@c1d5106acc3480c275a52344df84633bb6dcd8f01.0.0-alpha.86-3-gc1d5106aThe fail-open authorization behavior for
UploadPartCopywas introduced in:09ea11c13(pergit blameonrustfs/src/storage/access.rs:1443-1448)Affected range (recommended wording):
09ea11c13throughc1d5106acc3480c275a52344df84633bb6dcd8f0(and likely any releases containing those commits) until a fix is applied.Package version (Cargo metadata)
rustfscrate version in this tree: 0.0.5 (cargo metadata)Proof of Concept (PoC) – Real Commands + Verified Results
Files
Place the PoC script at the repository root:
poc_uploadpartcopy_exfil_v3.shpoc_v3_output.txtupload_part_copy_debug_redacted.log(Authorization/signature redacted)Environment
RustFS running locally (Docker is simplest), listening on:
http://127.0.0.1:9000Tools:
awscli,jq,awscurlSteps to Reproduce
chmod +x poc_uploadpartcopy_exfil_v3.sh ./poc_uploadpartcopy_exfil_v3.sh | tee poc_v3_output.txtAttachments
poc_uploadpartcopy_exfil_v3.shpoc_v3_output.txtExpected Behavior
Attacker operations against victim bucket should be denied:
ListObjects-> AccessDeniedHeadObject-> AccessDeniedGetObject-> AccessDeniedCopyObject-> AccessDeniedUploadPartCopyfrom victim -> attacker multipart should also be denied.Actual Behavior
UploadPartCopysucceeds, and attacker retrieves the copied object from attacker bucket.Observed PoC Output
Victim uploads a private object:
5,242,880bytesfda018db1da9d8f4c1b287c75943384a3b4ede391ec156039b6d94e17d6ad68fAttacker exfiltrates it via multipart copy:
5,242,880bytesfda018db1da9d8f4c1b287c75943384a3b4ede391ec156039b6d94e17d6ad68fProof:
Network Evidence (Redacted)
The debug log shows a successful request with:
PUT/<attacker-bucket>/<dst-key>?partNumber=1&uploadId=...x-amz-copy-source: <victim-bucket>/private/finance_dump.binHTTP/1.1 200with<CopyPartResult><ETag>...</ETag>...</CopyPartResult>Fix
Implement authorization checks equivalent to
copy_object()for multipart copy paths:upload_part_copy:GetObjectauthorization onx-amz-copy-sourcePutObjectauthorization on the target objectcopy_object()on the source.complete_multipart_upload:PutObjectauthorizationabort_multipart_upload:PutObjectas a safe boundary)References