RustFS: When 'Safe' Languages Leak Like a Sieve
Feb 3, 2026·6 min read·1 visit
Executive Summary (TL;DR)
RustFS versions alpha.13 through alpha.81 logged full S3 credentials (access/secret keys) in plaintext at the INFO log level. Attackers with access to logs (Splunk, ELK, local disk) can compromise the entire storage cluster. Patch to alpha.82 immediately and rotate all keys.
RustFS, a high-performance distributed object storage system, inadvertently implemented a feature that turns your log aggregation stack into a password manager. By logging authentication credentials at the INFO level, the system broadcasted Access Keys, Secret Keys, and Session Tokens to anyone with read access to the system logs.
The Hook: Memory Safe, Logic Unsafe
We love Rust. It saves us from double-frees, dangling pointers, and the nightmares of C++ memory management. But here's the kicker: the compiler can prevent you from writing to unallocated memory, but it can't prevent you from writing your secrets to stdout. That is exactly what happened with RustFS.
RustFS is designed to be a high-performance, S3-compatible object storage layer. It's the kind of thing you deploy when you want to handle petabytes of data without the overhead of the JVM. It handles authentication, data replication, and distribution. It holds the keys to the kingdom—literally.
CVE-2026-24762 isn't a complex buffer overflow or a race condition that requires nanosecond precision. It is the digital equivalent of a bank manager shouting the vault combination across the lobby every time they open it. For nearly 70 versions (alpha.13 to alpha.81), RustFS decided that Access Keys, Secret Keys, and Session Tokens were just mundane strings worthy of the INFO log level.
The Flaw: The Default Derive Trap
The root cause here is a classic developer convenience feature turning into a security liability. In Rust, we frequently use #[derive(Debug)] on structs to automatically generate code that can format the struct for output. It's fantastic for development. You want to see what's in your User object? Just println!("{:?}", user).
However, when you apply this indiscriminately to structs containing sensitive data, Debug does exactly what you asked it to do: it prints everything. The developers likely had a struct handling S3 credentials and, innocently enough, derived Debug on it. Then, somewhere in the authentication flow, they added a logging statement like info!("Authenticating request: {:?}", credentials).
The result? Every time a client authenticated, their full credentials were serialized into the application logs. Since this was done at INFO level—which is the default in almost every production environment—these secrets weren't just staying on the machine. They were being shipped to Datadog, Splunk, ELK, and CloudWatch, effectively creating a searchable database of valid API keys.
The Code: The Smoking Gun
Let's look at a reconstruction of the offending pattern. This is a common anti-pattern in Rust web services.
The Vulnerable Code (Simplification):
// The struct holds critical secrets
#[derive(Debug, Clone)] // <--- The culprit
pub struct S3Credentials {
pub access_key: String,
pub secret_key: String,
pub session_token: Option<String>,
}
fn authenticate(creds: &S3Credentials) {
// This looks helpful for debugging connection issues...
// But it dumps the secret_key in plaintext to logs.
log::info!("Processing auth for: {:?}", creds);
// ... processing logic
}When this runs, your logs fill up with:
[INFO] Processing auth for: S3Credentials { access_key: "AKIA...", secret_key: "wJalr...", session_token: None }
The Fix (Proper Trait Implementation):
To fix this, you must manually implement Debug (or Display) to redact sensitive fields, rather than deriving it automatically.
impl fmt::Debug for S3Credentials {
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
f.debug_struct("S3Credentials")
.field("access_key", &self.access_key)
.field("secret_key", &"[REDACTED]") // <--- Safe now
.field("session_token", &"[REDACTED]")
.finish()
}
}This change ensures that even if a developer blindly logs the struct, the output remains safe.
The Exploit: Grepping for Gold
Exploiting this requires zero technical sophistication regarding the RustFS binary itself. You don't need a debugger, you don't need shellcode, and you don't need to bypass ASLR. You just need access to the logs. This is often easier than gaining root access to the server itself. Log aggregators are frequently shared across teams with overly permissive read access.
Attack Scenario:
- Recon: Attacker gains read-only access to the company's ELK stack or compromises a developer laptop that has production log dumps.
- Search: The attacker runs a simple query:
grep -r "secret_key" /var/log/rustfs/ # OR in Kibana: service:rustfs AND message:"secret_key" - Extraction: The logs return valid JSON or Struct-formatted credentials.
- Persistence: The attacker uses the extracted S3 keys to upload a malicious object to the storage, or simply exfiltrate sensitive backups stored in the buckets.
The beauty (and horror) of this exploit is that it works historically. If you rotate the logs but not the keys, the attacker can mine data from six months ago and still likely find valid credentials.
The Impact: Why You Should Panic
The impact here is Complete Compromise of Data Confidentiality and Integrity. In object storage systems, the Access/Secret key pair is the ultimate authority.
With these keys, an attacker can:
- Exfiltrate Data: Download proprietary datasets, customer PII, or backups.
- Destroy Data: Issue
DeleteObjectorDeleteBucketcommands. Ransomware gangs love this—exfiltrate the data, delete the originals, demand payment. - Lateral Movement: If these S3 keys are actually AWS IAM keys (passthrough authentication), the attacker might be able to pivot from the storage layer into your EC2 infrastructure or Lambda functions.
Since INFO logs are voluminous, they are often retained for weeks or months. This vulnerability creates a massive window of exposure where every single successful authentication event was recorded.
The Fix: Rotate Everything
Patching the software is only step one. Upgrading to RustFS alpha.82 stops the bleeding—it stops new logs from containing secrets. However, it does nothing about the gigabytes of text files already sitting on your disk or in your cloud logging provider.
Your Remediation Checklist:
- Upgrade: Move to version
alpha.82immediately. - Scrub: You must purge existing logs.
sed -i 's/secret_key: ".*"/secret_key: "[REDACTED]"/g' /var/log/rustfs.log. Do this on your log servers, backups, and SIEM. - ROTATE KEYS: This is non-negotiable. Assume every key used in the last
Nmonths (whereNis your log retention period) is compromised. Issue new Access Keys and revoke the old ones. - Audit: Check your access logs for unusual IP addresses or user agents accessing your buckets using the compromised keys.
Official Patches
Technical Appendix
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:NAffected Systems
Affected Versions Detail
| Product | Affected Versions | Fixed Version |
|---|---|---|
RustFS rustfs | >= alpha.13, < alpha.82 | alpha.82 |
| Attribute | Detail |
|---|---|
| CWE | CWE-532 (Insertion of Sensitive Info into Log File) |
| CVSS v4.0 | 6.9 (Medium) |
| Attack Vector | Network (Log Access) |
| Exploit Complexity | Low |
| Data Leaked | Access Keys, Secret Keys, Session Tokens |
| Patch Status | Fixed in alpha.82 |
MITRE ATT&CK Mapping
The product writes sensitive information to log files, which can be read by anyone with access to the logs.
Vulnerability Timeline
Subscribe to updates
Get the latest CVE analysis reports delivered to your inbox.