CVE-2021-21287
Vulnerability from cvelistv5
Published
2021-02-01 17:15
Modified
2024-08-03 18:09
Severity ?
EPSS score ?
Summary
Server-Side Request Forgery in MinIO Browser API
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/minio/minio/pull/11337 | Patch, Third Party Advisory | |
security-advisories@github.com | https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z | Release Notes, Third Party Advisory | |
security-advisories@github.com | https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q | Third Party Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T18:09:15.757Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/minio/minio/pull/11337" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "minio", "vendor": "minio", "versions": [ { "status": "affected", "version": "\u003c RELEASE.2021-01-30T00-20-58Z" } ] } ], "descriptions": [ { "lang": "en", "value": "MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with \"MINIO_BROWSER=off\" environment variable." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918: Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-02-01T17:15:16", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/minio/minio/pull/11337" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z" } ], "source": { "advisory": "GHSA-m4qq-5f7c-693q", "discovery": "UNKNOWN" }, "title": "Server-Side Request Forgery in MinIO Browser API", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-21287", "STATE": "PUBLIC", "TITLE": "Server-Side Request Forgery in MinIO Browser API" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "minio", "version": { "version_data": [ { "version_value": "\u003c RELEASE.2021-01-30T00-20-58Z" } ] } } ] }, "vendor_name": "minio" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with \"MINIO_BROWSER=off\" environment variable." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.7, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-918: Server-Side Request Forgery (SSRF)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q", "refsource": "CONFIRM", "url": "https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q" }, { "name": "https://github.com/minio/minio/pull/11337", "refsource": "MISC", "url": "https://github.com/minio/minio/pull/11337" }, { "name": "https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276", "refsource": "MISC", "url": "https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276" }, { "name": "https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z", "refsource": "MISC", "url": "https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z" } ] }, "source": { "advisory": "GHSA-m4qq-5f7c-693q", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-21287", "datePublished": "2021-02-01T17:15:16", "dateReserved": "2020-12-22T00:00:00", "dateUpdated": "2024-08-03T18:09:15.757Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-21287\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2021-02-01T18:15:13.890\",\"lastModified\":\"2021-02-05T20:44:53.243\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with \\\"MINIO_BROWSER=off\\\" environment variable.\"},{\"lang\":\"es\",\"value\":\"MinIO es un Almacenamiento de Objetos de Alto Rendimiento publicado bajo la licencia Apache versi\u00f3n v2.0.\u0026#xa0;En MinIO anterior a la versi\u00f3n RELEASE.2021-01-30T00-20-58Z, se presenta una vulnerabilidad de tipo server-side request forgery.\u0026#xa0;La aplicaci\u00f3n objetivo puede tener una funcionalidad para importar datos de una URL, publicar datos en una URL o leer datos de una URL con que puedan ser alterada. El atacante modifica las llamadas a esta funcionalidad proporcionando una URL completamente diferente o al manipular c\u00f3mo se construyen las URL (salto de ruta, etc.).\u0026#xa0;En un ataque de tipo Server-Side Request Forgery (SSRF), el atacante puede abusar de la funcionalidad en el servidor para leer o actualizar recursos internos.\u0026#xa0;El atacante puede proporcionar o modificar una URL que el c\u00f3digo que se ejecuta en el servidor leer\u00e1 o enviar\u00e1 datos, y al seleccionar cuidadosamente las URL, el atacante puede leer la configuraci\u00f3n del servidor, como los metadatos de AWS,\u0026#xa0;conectarse a servicios internos como bases de datos habilitadas para HTTP, o realizar peticiones posteriores a servicios internos que no est\u00e9n destinados a ser expuestos.\u0026#xa0;Esto es corregido en la versi\u00f3n RELEASE.2021-01-30T00-20-58Z, se recomienda a todos los usuarios que actualicen.\u0026#xa0;Como soluci\u00f3n alternativa, puede desactivar la interfaz del navegador con la variable de entorno \\\"MINIO_BROWSER = off\\\"\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":4.0},{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:P/I:N/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-918\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2021-01-30t00-20-58z\",\"matchCriteriaId\":\"D3A143A4-A6FC-4BF5-B572-C66FF7D566FA\"}]}]}],\"references\":[{\"url\":\"https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/minio/minio/pull/11337\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.