7.7
CVSSv3

CVE-2021-21287

Published: 01/02/2021 Updated: 05/02/2021
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
CVSS v3 Base Score: 7.7 | Impact Score: 4 | Exploitability Score: 3.1
VMScore: 357
Vector: AV:N/AC:L/Au:S/C:P/I:N/A:N

Vulnerability Summary

MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with "MINIO_BROWSER=off" environment variable.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

minio minio

Vendor Advisories

In MinIO before version RELEASE2021-01-30T00-20-58Z there is a server-side request forgery vulnerability The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with The attacker modifies the calls to this functionality by supplying a complet ...

Github Repositories

炼石计划@渗透攻防宇宙,本星球我们不仅专注渗透攻防测试中的点点滴滴,又横向扩展学习代码基础与PHP/Java代码审计基础。两者相辅相成,只为更好的成长。

嗨,朋友你好,欢迎来到【炼石计划@渗透攻防宇宙】,这是继Java代码审计,PHP代码审计的又一力作。 本星球我们不仅专注渗透攻防测试中的点点滴滴,又横向扩展学习代码基础与PHP/Java代码审计基础。 两者相辅相成,配合九大学习内容,只为更好的成长。 在这里我们是有节奏成体系分

Go安全的学习中ing

Go安全 Go语言本来就比较安全hhh,介绍一些go相关的安全知识和安全开发,学习中ing 跟着大哥atao学习。 Go 学习 Go语言的IO库那么多,我该怎么选? Go 技术 "ParseThru" – Exploiting HTTP Parameter Smuggling in Golang Go web 简单的了解了gin框架,小类型的demo bubble 代码审计 Go语言代码安全审