Описание
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing PostPolicyBucket. To carry out this attack, the attacker requires credentials with arn:aws:s3:::* permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off MINIO_BROWSER=off.
Ссылки
- Patch
- ExploitIssue Tracking
- Vendor Advisory
- Patch
- ExploitIssue Tracking
- Vendor Advisory
- US Government Resource
Уязвимые конфигурации
Конфигурация 1Версия до 2023-03-20t20-16-18z (исключая)
cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*
EPSS
Процентиль: 98%
0.52087
Средний
8.8 High
CVSS3
Дефекты
CWE-269
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 8.8
debian
около 3 лет назад
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023 ...
CVSS3: 8.8
fstec
около 3 лет назад
Уязвимость компонента PostPolicyBucket сервера хранения объектов MinIO, позволяющая нарушителю выполнить произвольный код
EPSS
Процентиль: 98%
0.52087
Средний
8.8 High
CVSS3
Дефекты
CWE-269
NVD-CWE-noinfo