Vulnerability CVE-2021-21362


Published: 2021-03-08

Description:
MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-04T00-53-13Z it is possible to bypass a readOnly policy by creating a temporary 'mc share upload' URL. Everyone is impacted who uses MinIO multi-users. This is fixed in version RELEASE.2021-03-04T00-53-13Z. As a workaround, one can disable uploads with `Content-Type: multipart/form-data` as mentioned in the S3 API RESTObjectPOST docs by using a proxy in front of MinIO.

Type:

CWE-285

(Improper Authorization)

CVSS2 => (AV:N/AC:L/Au:S/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4/10
2.9/10
8/10
Exploit range
Attack complexity
Authentication
Remote
Low
Single time
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Minio -> Minio 

 References:
https://github.com/minio/minio/commit/039f59b552319fcc2f83631bb421a7d4b82bc482
https://github.com/minio/minio/pull/11682
https://github.com/minio/minio/releases/tag/RELEASE.2021-03-04T00-53-13Z
https://github.com/minio/minio/security/advisories/GHSA-hq5j-6r98-9m8v

Copyright 2024, cxsecurity.com

 

Back to Top