ALT-PU-2022-3382-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-24842
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. A security issue was found where an non-admin user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials. This in turn allows the user to escalate privilege to that of the root user. This vulnerability has been resolved in pull request #14729 and is included in `RELEASE.2022-04-12T06-55-35Z`. Users unable to upgrade may workaround this issue by explicitly adding a `admin:CreateServiceAccount` deny policy, however, this, in turn, denies the user the ability to create their own service accounts as well.
- https://github.com/minio/minio/commit/66b14a0d32684d527ae8018dc6d9d46ccce58ae3
- https://github.com/minio/minio/commit/66b14a0d32684d527ae8018dc6d9d46ccce58ae3
- https://github.com/minio/minio/pull/14729
- https://github.com/minio/minio/pull/14729
- https://github.com/minio/minio/security/advisories/GHSA-2j69-jjmg-534q
- https://github.com/minio/minio/security/advisories/GHSA-2j69-jjmg-534q
Modified: 2024-11-21
CVE-2022-31028
MinIO is a multi-cloud object storage solution. Starting with version RELEASE.2019-09-25T18-25-51Z and ending with version RELEASE.2022-06-02T02-11-04Z, MinIO is vulnerable to an unending go-routine buildup while keeping connections established due to HTTP clients not closing the connections. Public-facing MinIO deployments are most affected. Users should upgrade to RELEASE.2022-06-02T02-11-04Z to receive a patch. One possible workaround is to use a reverse proxy to limit the number of connections being attempted in front of MinIO, and actively rejecting connections from such malicious clients.
- https://gist.github.com/harshavardhana/2d00e6f909054d2d2524c71485ad02e1
- https://gist.github.com/harshavardhana/2d00e6f909054d2d2524c71485ad02e1
- https://github.com/minio/minio/pull/14995
- https://github.com/minio/minio/pull/14995
- https://github.com/minio/minio/releases/tag/RELEASE.2022-06-03T01-40-53Z
- https://github.com/minio/minio/releases/tag/RELEASE.2022-06-03T01-40-53Z
- https://github.com/minio/minio/security/advisories/GHSA-qrpr-r3pw-f636
- https://github.com/minio/minio/security/advisories/GHSA-qrpr-r3pw-f636
Modified: 2024-11-21
CVE-2022-35919
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. In affected versions all 'admin' users authorized for `admin:ServerUpdate` can selectively trigger an error that in response, returns the content of the path requested. Any normal OS system would allow access to contents at any arbitrary paths that are readable by MinIO process. Users are advised to upgrade. Users unable to upgrade may disable ServerUpdate API by denying the `admin:ServerUpdate` action for your admin users via IAM policies.
- http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html
- http://packetstormsecurity.com/files/175010/Minio-2022-07-29T19-40-48Z-Path-Traversal.html
- https://github.com/minio/minio/commit/bc72e4226e669d98c8e0f3eccc9297be9251c692
- https://github.com/minio/minio/commit/bc72e4226e669d98c8e0f3eccc9297be9251c692
- https://github.com/minio/minio/pull/15429
- https://github.com/minio/minio/pull/15429
- https://github.com/minio/minio/security/advisories/GHSA-gr9v-6pcm-rqvg
- https://github.com/minio/minio/security/advisories/GHSA-gr9v-6pcm-rqvg