CVE-2023-28434
CVSS V2 None
CVSS V3 None
Description
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.
Overview
- CVE ID
- CVE-2023-28434
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2023-03-22T21:15:18
- Last Modified Date
- 2023-03-28T16:24:55
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:* | 1 | OR | 2023-03-20t20-16-18z |
References
Reference URL | Reference Tags |
---|---|
https://github.com/minio/minio/commit/67f4ba154a27a1b06e48bfabda38355a010dfca5 | Patch |
https://github.com/minio/minio/pull/16849 | Exploit Issue Tracking |
https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2023-28434 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-28434 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2023-04-17 03:13:05 | Added to TrackCVE | |||
2023-04-17 03:13:09 | Weakness Enumeration | new |