Описание
Minio vulnerable to Privilege Escalation on Windows via Path separator manipulation
Impact
All users on Windows are impacted. MinIO fails to filter the \
character, which allows for arbitrary object placement across
buckets. As a result, a user with low privileges, such as an access key, service account, or STS credential, which only has permission to PutObject
in a specific bucket, can create an admin user.
Patches
There are two patches that fix this problem comprehensively
Workarounds
There are no known workarounds
References
The vulnerable code:
Ссылки
- https://github.com/minio/minio/security/advisories/GHSA-w23q-4hw3-2pp6
- https://nvd.nist.gov/vuln/detail/CVE-2023-28433
- https://github.com/minio/minio/commit/8d6558b23649f613414c8527b58973fbdfa4d1b8
- https://github.com/minio/minio/commit/b3c54ec81e0a06392abfb3a1ffcdc80c6fbf6ebc
- https://github.com/minio/minio/releases/tag/RELEASE.2023-03-20T20-16-18Z
Пакеты
github.com/minio/minio
< 0.0.0-202303200735
0.0.0-202303200735
Связанные уязвимости
Minio is a Multi-Cloud Object Storage framework. All users on Windows prior to version RELEASE.2023-03-20T20-16-18Z are impacted. MinIO fails to filter the `\` character, which allows for arbitrary object placement across buckets. As a result, a user with low privileges, such as an access key, service account, or STS credential, which only has permission to `PutObject` in a specific bucket, can create an admin user. This issue is patched in RELEASE.2023-03-20T20-16-18Z. There are no known workarounds.
Minio is a Multi-Cloud Object Storage framework. All users on Windows ...
Уязвимость сервера хранения объектов MinIO, связанная с недостатками контроля доступа, позволяющая нарушителю создать пользователя с правами администратора