Page 2 of 15 results (0.005 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 3

19 Mar 2021 — MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-17T02-33-02Z, there is a vulnerability which enables MITM modification of request bodies that are meant to have integrity guaranteed by chunk signatures. In a PUT request using aws-chunked encoding, MinIO ordinarily verifies signatures at the end of a chunk. This check can be skipped if the client sends a false chunk size that is much greater ... • https://github.com/minio/minio/commit/e197800f9055489415b53cf137e31e194aaf7ba0 • CWE-924: Improper Enforcement of Message Integrity During Transmission in a Communication Channel •

CVSS: 7.7EPSS: 0%CPEs: 1EXPL: 1

08 Mar 2021 — MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-04T00-53-13Z it is possible to bypass a readOnly policy by creating a temporary 'mc share upload' URL. Everyone is impacted who uses MinIO multi-users. This is fixed in version RELEASE.2021-03-04T00-53-13Z. As a workaround, one can disable uploads with `Content-Type: multipart/form-data` as mentioned in the S3 API RESTObjectPOST docs by using ... • https://github.com/minio/minio/commit/039f59b552319fcc2f83631bb421a7d4b82bc482 • CWE-285: Improper Authorization CWE-863: Incorrect Authorization •

CVSS: 7.7EPSS: 96%CPEs: 1EXPL: 0

01 Feb 2021 — MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a... • https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

23 Apr 2020 — MinIO versions before RELEASE.2020-04-23T00-58-49Z have an authentication bypass issue in the MinIO admin API. Given an admin access key, it is possible to perform admin API operations i.e. creating new service accounts for existing access keys - without knowing the admin secret key. This has been fixed and released in version RELEASE.2020-04-23T00-58-49Z. MinIO versiones anteriores a la versión RELEASE.2020-04-23T00-58-49Z, tiene un problema de omisión de autenticación en la API de administración de MinIO.... • https://github.com/minio/minio/commit/4cd6ca02c7957aeb2de3eede08b0754332a77923 • CWE-305: Authentication Bypass by Primary Weakness CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

26 Jun 2018 — Minio Inc. Minio S3 server version prior to RELEASE.2018-05-16T23-35-33Z contains a Allocation of Memory Without Limits or Throttling (similar to CWE-774) vulnerability in write-to-RAM that can result in Denial of Service. This attack appear to be exploitable via Sending V4-(pre)signed requests with large bodies . This vulnerability appears to have been fixed in after commit 9c8b7306f55f2c8c0a5c7cea9a8db9d34be8faa7. El servidor Minio S3, de Minio Inc., en versiones anteriores al RELEASE.2018-05-16T23-35-33Z... • https://github.com/minio/minio/commit/9c8b7306f55f2c8c0a5c7cea9a8db9d34be8faa7#diff-e8c3bc9bc83b5516d0cc806cd461d08bL220 • CWE-774: Allocation of File Descriptors or Handles Without Limits or Throttling •