Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the RustFS Console allows an attacker to execute arbitrary JavaScript in the context of the management console. By bypassing the PDF preview logic, an attacker can steal administrator credentials from localStorage, leading to full account takeover and system compromise.
Details
The vulnerability exists due to improper validation of the response content type during the file preview process and a lack of origin separation between the S3 object delivery and the management console.
- Origin of Credentials: The RustFS Console stores highly sensitive S3 credentials (AccessKey, SecretKey, SessionToken) in the browser's
localStorage.
- File:
console/composables/useAuth.ts
- Evidence: Lines 14 and 18-25 show that credentials are held in
useLocalStorage('auth.credentials', {}) and useLocalStorage('auth.permanent', undefined).
- Insecure Preview Implementation: In
console/components/object/preview-modal.vue, the application identifies a PDF file based on its extension or metadata and renders it using an <iframe>.
- Same-Origin Vulnerability: RustFS typically hosts the management console and the S3 API on the same origin (e.g., the same IP and port).
- Bypass Attack: An attacker can upload a file named
xss.pdf but set its Content-Type metadata to text/html. Because the iframe is hosted on the same origin as the console, the executed script has unrestricted access to the parent window's localStorage.
PoC

This PoC demonstrates how to steal a victim's administrative credentials by tricking them into previewing a malicious file.
1. Create the malicious payload (xss.html):
<script>
alert('XSS Success!\nLocalStorage Data: ' + JSON.stringify(window.parent.localStorage));
</script>
2. Setup the environment and upload the payload:
# 1. Create a target bucket
mc mb rustfs/my-bucket
# 2. Upload the HTML file as a PDF with HTML content type
mc cp xss.html rustfs/my-bucket/xss.pdf --attr "Content-Type=text/html"
3. Trigger the vulnerability:
- Login to the RustFS Console as an administrator.
- Navigate to
my-bucket.
- Click the "Preview" button for the
xss.pdf file.
- The JavaScript executes, demonstrating access to the administrative session data.
Impact
- Character: Stored Cross-Site Scripting (XSS).
- Target: System Administrators using the Console.
- Result: Full Account Takeover (ATO). An attacker gains the victim's
AccessKeyId, SecretAccessKey, and SessionToken. This allows the attacker to perform any administrative action, including deleting data, creating backdoors, or downloading the entire filesystem via the S3 API.
Proposed Mitigation
- Origin Separation: Implement a dedicated domain for data delivery (e.g.,
*.data.rustfs.io) that is different from the console domain. This leverages the Same-Origin Policy (SOP) to isolate user-uploaded content.
- Security Headers: Implement strict security headers in the backend:
Content-Security-Policy (CSP): Disallow inline scripts and restrict script execution.
X-Content-Type-Options: nosniff: Prevent browsers from sniffing and executing content that differs from the declared type.
References
Summary
A Stored Cross-Site Scripting (XSS) vulnerability in the RustFS Console allows an attacker to execute arbitrary JavaScript in the context of the management console. By bypassing the PDF preview logic, an attacker can steal administrator credentials from
localStorage, leading to full account takeover and system compromise.Details
The vulnerability exists due to improper validation of the response content type during the file preview process and a lack of origin separation between the S3 object delivery and the management console.
localStorage.console/composables/useAuth.tsuseLocalStorage('auth.credentials', {})anduseLocalStorage('auth.permanent', undefined).console/components/object/preview-modal.vue, the application identifies a PDF file based on its extension or metadata and renders it using an<iframe>.xss.pdfbut set itsContent-Typemetadata totext/html. Because theiframeis hosted on the same origin as the console, the executed script has unrestricted access to the parent window'slocalStorage.PoC
This PoC demonstrates how to steal a victim's administrative credentials by tricking them into previewing a malicious file.
1. Create the malicious payload (
xss.html):2. Setup the environment and upload the payload:
3. Trigger the vulnerability:
my-bucket.xss.pdffile.Impact
AccessKeyId,SecretAccessKey, andSessionToken. This allows the attacker to perform any administrative action, including deleting data, creating backdoors, or downloading the entire filesystem via the S3 API.Proposed Mitigation
*.data.rustfs.io) that is different from the console domain. This leverages the Same-Origin Policy (SOP) to isolate user-uploaded content.Content-Security-Policy (CSP): Disallow inline scripts and restrict script execution.X-Content-Type-Options: nosniff: Prevent browsers from sniffing and executing content that differs from the declared type.References