Description: MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-17T02-33-02Z, there is a vulnerability which enables MITM modification of request bodies that are meant to have integrity guaranteed by chunk signatures. In a PUT request using aws-chunked encoding, MinIO ordinarily verifies signatures at the end of a chunk. This check can be skipped if the client sends a false chunk size that is much greater than the actual data sent: the server accepts and completes the request without ever reaching the end of the chunk + thereby without ever checking the chunk signature. This is fixed in version RELEASE.2021-03-17T02-33-02Z. As a workaround one can avoid using “aws-chunked” encoding-based chunk signature upload requests instead use TLS. MinIO SDKs automatically disable chunked encoding signature when the server endpoint is configured with TLS.
CVE-2021-21390
Published Date: 2021-03-19T16:15Z
Last Modified: 2021-03-25T20:29Z
CVSS Score: 5.9 (MEDIUM)
EPSS Score: 0.06%
Risk Score: 4.13 (MEDIUM)
Risk Score based on CVSS score and EPSS. This score is for reference purposes and is not internationally recognized.
CVSS:
5.9 |
EPSS:
0.06%
Mitre ATT&CK Technical v15.1
T1153 – Source
T1583.004 – Server
T1584.004 – Server
T1053.002 – At
Technical Analysis & Mitigation Measures
Reference Links
Vendor - Produce - Version
minio - minio
Disclaimer
The content on this website is automatically sourced from external websites such as the National Vulnerability Database (NVD), GitHub, and other security-related sources. This content is for reference purposes only, and we are not responsible for the accuracy or integrity of the information linked or displayed from these sources.