DIVD-2023-00037 - Security Feature Bypass in MinIO
Our reference | DIVD-2023-00037 |
Case lead | Alwin Warringa |
Author | Max van der Horst |
Researcher(s) | |
CVE(s) | |
Products |
|
Versions |
|
Recommendation | Upgrade by installing the issued patch as soon as possible or apply the mentioned workaround. |
Patch status | patches available |
Workaround | Enable Browser API Access and disable 'MINIO_BROWSER' |
Status | Closed |
Last modified | 25 Apr 2024 18:52 CEST |
Summary
Prior to MinIO version RELEASE.2023-03-020T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing PostPolicyBucket
. To carry out this attack, the attacker requires credentials with arn:aws:s3:::*
permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off MINIO_BROWSER=off
.
Recommendations
Install the patched version of RELEASE.2023-03-20T20-16-18Z or apply the workaround by enabling browser API access and turning off MINIO_BROWSER
.
What we are doing
DIVD is scanning for vulnerable systems. Owners of such systems will receive a notification with this casefile and remediation steps.
Timeline
Date | Description |
---|---|
26 Sep 2023 | DIVD starts scanning for this vulnerability. |
26 Sep 2023 | First version of this casefile. |
30 Nov 2023 | Case closed because finding a good fingerprint method failed |