CVE-2023-28434
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with specific permissions to bypass security checks and upload files to any bucket in Minio, potentially leading to unauthorized data exposure. To exploit this, the attacker needs valid credentials that allow broad access and must have Console API access enabled.
Technical Description
Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 22, 2023
about 3 years ago
Last Modified
Feb 26, 2026
about 1 month ago
Vendor
minio
Product
minio