ID

VAR-202303-1848


CVE

CVE-2023-28434


TITLE

Minio Inc.  of  Minio  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2023-005843

DESCRIPTION

Minio is a Multi-Cloud Object Storage framework. Prior to RELEASE.2023-03-20T20-16-18Z, an attacker can use crafted requests to bypass metadata bucket name checking and put an object into any bucket while processing `PostPolicyBucket`. To carry out this attack, the attacker requires credentials with `arn:aws:s3:::*` permission, as well as enabled Console API access. This issue has been patched in RELEASE.2023-03-20T20-16-18Z. As a workaround, enable browser API access and turn off `MINIO_BROWSER=off`. Minio Inc. of Minio Exists in unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Trust: 1.71

sources: NVD: CVE-2023-28434 // JVNDB: JVNDB-2023-005843 // VULMON: CVE-2023-28434

AFFECTED PRODUCTS

vendor:miniomodel:minioscope:ltversion:2023-03-20t20-16-18z

Trust: 1.0

vendor:miniomodel:minioscope: - version: -

Trust: 0.8

vendor:miniomodel:minioscope:eqversion: -

Trust: 0.8

vendor:miniomodel:minioscope:eqversion:2023-03-20t20-16-18z

Trust: 0.8

sources: JVNDB: JVNDB-2023-005843 // NVD: CVE-2023-28434

CVSS

SEVERITY

CVSSV2

CVSSV3

NVD: CVE-2023-28434
value: HIGH

Trust: 1.8

security-advisories@github.com: CVE-2023-28434
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202303-1792
value: HIGH

Trust: 0.6

NVD:
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 2.0

NVD: CVE-2023-28434
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2023-005843 // NVD: CVE-2023-28434 // NVD: CVE-2023-28434 // CNNVD: CNNVD-202303-1792

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Lack of information (CWE-noinfo) [NVD evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2023-005843 // NVD: CVE-2023-28434

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202303-1792

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202303-1792

CONFIGURATIONS

sources: NVD: CVE-2023-28434

PATCH

title:MinIO Security vulnerabilitiesurl:http://123.124.177.30/web/xxk/bdxqbyid.tag?id=230916

Trust: 0.6

title: - url:https://github.com/mr-xn/cve-2023-28434

Trust: 0.1

sources: VULMON: CVE-2023-28434 // CNNVD: CNNVD-202303-1792

EXTERNAL IDS

db:NVDid:CVE-2023-28434

Trust: 3.3

db:JVNDBid:JVNDB-2023-005843

Trust: 0.8

db:CNNVDid:CNNVD-202303-1792

Trust: 0.6

db:VULMONid:CVE-2023-28434

Trust: 0.1

sources: VULMON: CVE-2023-28434 // JVNDB: JVNDB-2023-005843 // NVD: CVE-2023-28434 // CNNVD: CNNVD-202303-1792

REFERENCES

url:https://github.com/minio/minio/security/advisories/ghsa-2pxw-r47w-4p8c

Trust: 2.5

url:https://github.com/minio/minio/pull/16849

Trust: 2.5

url:https://github.com/minio/minio/commit/67f4ba154a27a1b06e48bfabda38355a010dfca5

Trust: 2.5

url:https://nvd.nist.gov/vuln/detail/cve-2023-28434

Trust: 0.8

url:https://www.cisa.gov/known-exploited-vulnerabilities-catalog

Trust: 0.8

url:https://cxsecurity.com/cveshow/cve-2023-28434/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/269.html

Trust: 0.1

url:https://github.com/mr-xn/cve-2023-28434

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULMON: CVE-2023-28434 // JVNDB: JVNDB-2023-005843 // NVD: CVE-2023-28434 // CNNVD: CNNVD-202303-1792

SOURCES

db:VULMONid:CVE-2023-28434
db:JVNDBid:JVNDB-2023-005843
db:NVDid:CVE-2023-28434
db:CNNVDid:CNNVD-202303-1792

LAST UPDATE DATE

2023-12-18T12:41:15.671000+00:00


SOURCES UPDATE DATE

db:VULMONid:CVE-2023-28434date:2023-03-23T00:00:00
db:JVNDBid:JVNDB-2023-005843date:2023-11-10T04:23:00
db:NVDid:CVE-2023-28434date:2023-11-07T04:10:35.730
db:CNNVDid:CNNVD-202303-1792date:2023-03-29T00:00:00

SOURCES RELEASE DATE

db:VULMONid:CVE-2023-28434date:2023-03-22T00:00:00
db:JVNDBid:JVNDB-2023-005843date:2023-11-10T00:00:00
db:NVDid:CVE-2023-28434date:2023-03-22T21:15:18.427
db:CNNVDid:CNNVD-202303-1792date:2023-03-22T00:00:00