CVE-2023-28434

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with specific permissions to bypass security checks and upload files to any bucket in Minio, potentially leading to unauthorized data exposure. To exploit this, the attacker needs valid credentials that allow broad access and must have Console API access enabled.

Technical Description

Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$4,789($1K-$5K)
Vendor Response
Grade FPatched in 1071 days

Quick Information

Published

Mar 22, 2023

about 3 years ago

Last Modified

Feb 26, 2026

about 1 month ago

Vendor

minio

Product

minio