CVE-2021-21287
Server-Side Request Forgery in MinIO Browser API
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with "MINIO_BROWSER=off" environment variable.
MinIO es un Almacenamiento de Objetos de Alto Rendimiento publicado bajo la licencia Apache versión v2.0. En MinIO anterior a la versión RELEASE.2021-01-30T00-20-58Z, se presenta una vulnerabilidad de tipo server-side request forgery. La aplicación objetivo puede tener una funcionalidad para importar datos de una URL, publicar datos en una URL o leer datos de una URL con que puedan ser alterada. El atacante modifica las llamadas a esta funcionalidad proporcionando una URL completamente diferente o al manipular cómo se construyen las URL (salto de ruta, etc.). En un ataque de tipo Server-Side Request Forgery (SSRF), el atacante puede abusar de la funcionalidad en el servidor para leer o actualizar recursos internos. El atacante puede proporcionar o modificar una URL que el código que se ejecuta en el servidor leerá o enviará datos, y al seleccionar cuidadosamente las URL, el atacante puede leer la configuración del servidor, como los metadatos de AWS, conectarse a servicios internos como bases de datos habilitadas para HTTP, o realizar peticiones posteriores a servicios internos que no estén destinados a ser expuestos. Esto es corregido en la versión RELEASE.2021-01-30T00-20-58Z, se recomienda a todos los usuarios que actualicen. Como solución alternativa, puede desactivar la interfaz del navegador con la variable de entorno "MINIO_BROWSER = off"
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-12-22 CVE Reserved
- 2021-02-01 CVE Published
- 2024-08-03 CVE Updated
- 2024-12-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z | Release Notes | |
https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276 | 2021-02-05 | |
https://github.com/minio/minio/pull/11337 | 2021-02-05 |
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Minio Search vendor "Minio" | Minio Search vendor "Minio" for product "Minio" | < 2021-01-30t00-20-58z Search vendor "Minio" for product "Minio" and version " < 2021-01-30t00-20-58z" | - |
Affected
|