LOW
The severity is LOW as the issue is related to improper configuration rather than a security vulnerability. Real-world exploitability is low unless attackers can manipulate configurations. No patches are necessary, only correct usage.

The AWS SDK for Rust application 'shuk' is vulnerable due to incorrect configuration that does not properly use S3-compatible APIs with other clouds. This can lead to misdirected requests and potential data exposure if used improperly.

Affected Systems
  • AWS SDK for Rust version with shuk
Affected Versions: All versions using incorrect S3-compatible API configuration
Remediation
  • Use .profile_name() to fully load the profile when configuring AWS SDK for Rust applications.
  • Ensure correct ENDPOINT_URL is set in the configuration to avoid misdirected requests.
Stack Impact

This affects the usage of the AWS S3 API with other cloud providers that support S3-compatible APIs. It does not impact nginx, docker, linux kernel, openssh, curl, openssl, python, or homelab components.

Source →