CVE-2026-39360
Received Received - Intake
Missing Authorization in RustFS Multipart Copy Enables Data Exfiltration

Publication date: 2026-04-07

Last updated on: 2026-04-10

Assigner: GitHub, Inc.

Description
RustFS is a distributed object storage system built in Rust. Prior to alpha.90, RustFS contains a missing authorization check in the multipart copy path (UploadPartCopy). A low-privileged user who cannot read objects from a victim bucket can still exfiltrate victim objects by copying them into an attacker-controlled multipart upload and completing the upload. This breaks tenant isolation in multi-user / multi-tenant deployments. This vulnerability is fixed in alpha.90.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-10
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 89 associated CPEs
Vendor Product Version / Range
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
rustfs rustfs 1.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability breaks tenant isolation in multi-user or multi-tenant deployments by allowing unauthorized cross-tenant data exfiltration. Such unauthorized access to private data can lead to violations of data protection regulations and standards that require strict access controls and data confidentiality, such as GDPR and HIPAA.

Because an attacker can copy private objects from a victim bucket without proper authorization, this flaw poses a high confidentiality risk. This risk can result in non-compliance with regulations that mandate protection of sensitive or personal data against unauthorized access and disclosure.


Can you explain this vulnerability to me?

CVE-2026-39360 is an authorization bypass vulnerability in the RustFS distributed object storage system prior to version alpha.90. It occurs in the multipart copy operation (UploadPartCopy), where the system fails to check if a user has permission to read objects from a source bucket.

Because of this missing authorization check, a low-privileged user who normally cannot read objects from a victim's bucket can still copy those objects into their own bucket by exploiting multipart upload copy functions. This breaks tenant isolation in multi-user or multi-tenant environments.

Technically, the multipart copy functions return success without verifying permissions, unlike the single-part copy operation which correctly enforces source and destination permissions. This flaw allows unauthorized exfiltration of private data.


How can this vulnerability impact me? :

This vulnerability can lead to unauthorized data leakage where an attacker with minimal permissions on their own bucket can copy private objects from another user's bucket without having any read permissions on that bucket.

In multi-tenant deployments, this breaks tenant isolation, allowing attackers to exfiltrate confidential or sensitive data from other tenants.

The impact is a moderate severity risk that compromises confidentiality by enabling unauthorized cross-tenant data access and exfiltration.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves missing authorization checks in multipart copy operations within RustFS, allowing unauthorized data exfiltration. Detection would involve monitoring multipart upload copy activities that bypass expected permission checks.

Since the vulnerability exploits multipart UploadPartCopy operations without proper authorization, you can detect suspicious activity by auditing multipart upload requests, especially those involving the UploadPartCopy API calls.

Suggested commands or approaches include:

  • Review logs for multipart upload operations, focusing on UploadPartCopy requests that copy objects from buckets where the requester lacks read permissions.
  • Use RustFS or system audit logs to identify multipart uploads completed without corresponding authorization checks.
  • If you have access to RustFS source or debug logs, trace calls to `upload_part_copy()`, `complete_multipart_upload()`, and `abort_multipart_upload()` to verify if authorization checks are missing.
  • Monitor network traffic for suspicious multipart copy requests that include the `x-amz-copy-source` header referencing buckets the user should not access.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to upgrade RustFS to version alpha.90 or later, where the missing authorization checks in multipart copy operations have been fixed.

Until the upgrade can be applied, consider the following immediate steps:

  • Restrict permissions for users to perform multipart upload copy operations, especially limiting the ability to create multipart uploads and upload parts unless fully trusted.
  • Implement additional access controls or monitoring to detect and block unauthorized multipart copy requests.
  • Audit and review bucket policies to ensure minimal exposure and enforce strict tenant isolation.
  • If possible, temporarily disable multipart copy functionality or restrict it to trusted users until the patch is applied.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart