CVE-2026-21862
Summary
IP-based access control can be bypassed: getconditionvalues trusts client-supplied X-Forwarded-For/X-Real-Ip without verifying a trusted proxy, so any reachable client can spoof aws:SourceIp and satisfy IP-allowlist policies.
Details
- Vulnerable code:
rustfs/src/auth.rs:289-304setsremote_addrfromX-Forwarded-For/X-Real-Ip, then insertsSourceIpvia
getsourceip_raw, with no trust boundary or proxy validation:
let remoteaddr = header.get("x-forwarded-for").andthen(...).orelse(|| header.get("x-real-ip")...).unwrapor("127.0.0.1");args.insert("SourceIp", vec![getsourceipraw(header, remoteaddr)]);
- This value feeds IAM/bucket policy evaluation in
rustfs/src/storage/access.rs(authorization path), so any request that forges the header can meetaws:SourceIpconditions. - No authentication is required beyond the request itself; the header is taken at face value even on direct connections.
PoC
rustfs-auth-trusted-ip-header-spoofing-poc.tar.gz
Steps (already included in rustfs-auth-trusted-ip-header-spoofing-poc/):
- Start RustFS with two local volumes, e.g.:
mkdir -p /tmp/rustfs-data1 /tmp/rustfs-data2
RUSTFS_ACCESS_KEY=devadmin RUSTFS_SECRET_KEY=devadmin \
cargo run --bin rustfs -- --address 0.0.0.0:9000 \
/tmp/rustfs-data1 /tmp/rustfs-data2- From
rustfs-auth-trusted-ip-header-spoofing-poc/, run:
ENDPOINT=http://127.0.0.1:9000 make runThe script:
- Creates bucket
rustfs-trusted-ip-poc. - Applies a bucket policy allowing
s3:ListBucketonly from10.0.0.5/32(Principal: {"AWS":["*"]},Resource array). - Sends three unauthenticated
ListBucketcalls:- Baseline (no spoof) → HTTP 403.
- Spoofed
X-Forwarded-For: 10.0.0.5→ HTTP 200 (policy bypass). - Spoofed
X-Forwarded-For: 1.2.3.4→ HTTP 403.
- Responses saved to
poc-baseline.xml,poc-spoofed.xml,poc-deny.xml.
- Creates bucket
Impact
- Vulnerability type: Authorization bypass of IP-allowlist (
aws:SourceIp) via header spoofing. - Who is impacted: Any deployment relying on
aws:SourceIpin IAM/bucket policies for S3 operations. Attackers with network reach to RustFS can forge forwarded-IP headers to gain list/read/write where IP restrictions were meant to block them.
Credits
Identified by SecMate (https://secmate.dev) automated analysis and validated during manual triage.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://github.com/rustfs/rustfs/security/advisories/GHSA-fc6g-2gcp-2qrq, https://nvd.nist.gov/vuln/detail/CVE-2026-21862, https://github.com/rustfs/rustfs/commit/b4ba62fa3300b5b258fdc0da141481e3be7ea960, https://github.com/rustfs/rustfs
