Lucene search

K
cve[email protected]CVE-2023-28434
HistoryMar 22, 2023 - 9:15 p.m.

CVE-2023-28434

2023-03-2221:15:18
CWE-269
web.nvd.nist.gov
329
In Wild
minio
multi-cloud object storage
cve-2023-28434
security
patch
vulnerability
object placement
crafted requests
metadata bypass
postpolicybucket
api access

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.062 Low

EPSS

Percentile

93.6%

Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing PostPolicyBucket. To carry out this attack, the attacker requires credentials with arn:aws:s3:::* permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off MINIO_BROWSER=off.

Affected configurations

Vulners
NVD
Node
miniominioRange<2023-03-20T20-16-18Z
VendorProductVersionCPE
miniominio*cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "minio",
    "product": "minio",
    "versions": [
      {
        "version": "< RELEASE.2023-03-20T20-16-18Z",
        "status": "affected"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.5 High

AI Score

Confidence

High

0.062 Low

EPSS

Percentile

93.6%