Skip to content

x/vulndb: potential Go vuln in github.com/minio/minio: CVE-2021-21362 #2322

@tatianab

Description

@tatianab

CVE-2021-21362 references github.com/minio/minio, which may be a Go module.

Description:
MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-04T00-53-13Z it is possible to bypass a readOnly policy by creating a temporary 'mc share upload' URL. Everyone is impacted who uses MinIO multi-users. This is fixed in version RELEASE.2021-03-04T00-53-13Z. As a workaround, one can disable uploads with Content-Type: multipart/form-data as mentioned in the S3 API RESTObjectPOST docs by using a proxy in front of MinIO.

References:

Cross references:

See doc/triage.md for instructions on how to triage this report.

modules:
    - module: github.com/minio/minio
      vulnerable_at: 0.0.0-20231108174705-15137d032704
      packages:
        - package: minio
cves:
    - CVE-2021-21362
references:
    - advisory: https://github.com/minio/minio/security/advisories/GHSA-hq5j-6r98-9m8v
    - fix: https://github.com/minio/minio/pull/11682
    - fix: https://github.com/minio/minio/commit/039f59b552319fcc2f83631bb421a7d4b82bc482
    - web: https://github.com/minio/minio/releases/tag/RELEASE.2021-03-04T00-53-13Z

Metadata

Metadata

Assignees

No one assigned

    Labels

    excluded: LEGACY_FALSE_POSITIVE(DO NOT USE) Vulnerability marked as false positive before we introduced the triage process

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions