CVE-2021-21287
📋 TL;DR
This CVE describes a server-side request forgery (SSRF) vulnerability in MinIO object storage software. Attackers can manipulate URL parameters to make the server send requests to internal systems, potentially accessing sensitive data or internal services. All MinIO deployments before version RELEASE.2021-01-30T00-20-58Z are affected.
💻 Affected Systems
- MinIO
📦 What is this software?
Minio by Minio
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of internal infrastructure including access to cloud metadata services, internal databases, and internal APIs, potentially leading to data exfiltration or lateral movement.
Likely Case
Information disclosure of internal services, AWS metadata, or configuration data that could enable further attacks.
If Mitigated
Limited impact with proper network segmentation and access controls, potentially only revealing non-sensitive information.
🎯 Exploit Status
SSRF vulnerabilities are commonly exploited and tooling exists for automated exploitation.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: RELEASE.2021-01-30T00-20-58Z or later
Vendor Advisory: https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q
Restart Required: Yes
Instructions:
1. Backup your MinIO configuration and data. 2. Stop the MinIO service. 3. Download and install version RELEASE.2021-01-30T00-20-58Z or later from the official MinIO releases. 4. Restart the MinIO service. 5. Verify the version is updated.
🔧 Temporary Workarounds
Disable Browser Front-end
allDisables the vulnerable browser interface component
export MINIO_BROWSER=off
minio server /data
🧯 If You Can't Patch
- Implement strict network segmentation to isolate MinIO instances from internal networks
- Deploy web application firewall (WAF) rules to block SSRF patterns and restrict URL parameters
🔍 How to Verify
Check if Vulnerable:
Check MinIO version: if version is older than RELEASE.2021-01-30T00-20-58Z, system is vulnerable
Check Version:
minio version
Verify Fix Applied:
Confirm version is RELEASE.2021-01-30T00-20-58Z or newer and test SSRF attempts are blocked
📡 Detection & Monitoring
Log Indicators:
- Unusual URL patterns in requests
- Requests to internal IP addresses or metadata endpoints
- Error responses from internal services
Network Indicators:
- Outbound connections from MinIO server to internal services
- Requests to cloud metadata endpoints (169.254.169.254)
SIEM Query:
source="minio" AND (url="*metadata*" OR url="*169.254*" OR url="*localhost*" OR url="*127.0.0.1*")
🔗 References
- https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276
- https://github.com/minio/minio/pull/11337
- https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z
- https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q
- https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276
- https://github.com/minio/minio/pull/11337
- https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z
- https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q