Thursday, May 8, 2025
HomeCVE/vulnerabilityAlibaba Cloud Storage Flaw Exposes Data to Unauthorized Uploads

Alibaba Cloud Storage Flaw Exposes Data to Unauthorized Uploads

Published on

SIEM as a Service

Follow Us on Google News

A significant vulnerability has been discovered in the Alibaba Cloud Object Storage Service (OSS) that allows unauthorized users to upload data, posing critical security risks for organizations relying on this cloud solution.

The vulnerability, caused by the misconfiguration of the PUT method, potentially exposes sensitive data and leaves storage buckets open to exploitation.

The security researcher behind this finding shared a detailed walkthrough of their discovery process:

- Advertisement - Google News

1. Identifying the Target

While browsing a target website, the researcher encountered a “403 Forbidden” response, indicating restricted access to a specific resource.

2. Technology Detection

Using the Wappalyzer browser extension, the researcher confirmed that the website was utilizing Alibaba Cloud Object Storage Service (OSS) for its storage infrastructure.

3. Capturing the Request

The researcher employed Burp Suite to capture and analyze the request made to the server. The initial request was structured as follows:

GET / HTTP/1.1

Host: target.com

...

The server responded with a “403 Forbidden” message but disclosed that it was running on the AliyunOSS platform.

4. Testing the PUT Method

Despite the restricted “GET” request, the researcher proceeded to test the “PUT” method, which allows users to upload data to the server. A modified request was sent to upload a JSON file (poc.json) containing a simple payload:

PUT /poc.json HTTP/1.1

Host: target.com

...

Content-Length: 32 

{"id": "hacked-by-waseem"}

5. Successful Upload

Surprisingly, the server responded with a “200 OK” status, indicating that the file was successfully uploaded.

HTTP/1.1 200 OK

Server: AliyunOSS

Date: ...

ETag: "1650257635488786160B4C064076B0A1"HTTP/1.1 200 OK

Server: AliyunOSS

Date: ...

ETag: "1650257635488786160B4C064076B0A1"

6. Verifying the Upload

The uploaded file was then accessed, confirming that the data was successfully stored in the target OSS bucket.

This misconfiguration in Alibaba Cloud OSS could lead to:

  1. Unauthorized Data Storage: Attackers could use the storage bucket to upload malicious or illicit content.
  2. Overwriting Files: Attackers could overwrite existing files, potentially impacting operational data or applications.
  3. Data Breaches: Sensitive information stored in the bucket could be exposed due to unauthorized uploads or access.

This critical vulnerability highlights the importance of securing cloud storage configurations.

Organizations using Alibaba Cloud OSS must assess their security settings immediately, ensuring that robust authentication and access control mechanisms are in place to prevent unauthorized actions.

As cloud-based storage continues to grow in popularity, such findings serve as a reminder of the ever-present need for vigilance in securing digital assets.

Are you from SOC/DFIR Teams? – Analyse Malware Files & Links with ANY.RUN Sandox -> Start Now for Free.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Cisco IOS XE Wireless Controllers Vulnerability Lets Attackers Seize Full Control

A critical security flaw has been discovered in Cisco IOS XE Wireless LAN Controllers...

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...

SpyCloud Analysis Reveals 94% of Fortune 50 Companies Have Employee Data Exposed in Phishing Attacks

SpyCloud, the leading identity threat protection company, today released an analysis of nearly 6...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Cisco IOS XE Wireless Controllers Vulnerability Lets Attackers Seize Full Control

A critical security flaw has been discovered in Cisco IOS XE Wireless LAN Controllers...

Top Ransomware Groups Target Financial Sector, 406 Incidents Revealed

Flashpoint analysts have reported that between April 2024 and April 2025, the financial sector...

Agenda Ransomware Group Enhances Tactics with SmokeLoader and NETXLOADER

The Agenda ransomware group, also known as Qilin, has been reported to intensify its...