CVE-2023-28434
📋 TL;DR
This vulnerability allows authenticated attackers with S3 permissions to bypass bucket name validation and write objects to any bucket in Minio object storage systems. It affects Minio deployments with Console API access enabled prior to March 2023. Attackers need valid credentials with arn:aws:s3:::* permissions to exploit this flaw.
💻 Affected Systems
- Minio
📦 What is this software?
Minio by Minio
⚠️ Risk & Real-World Impact
Worst Case
Attackers could overwrite critical data, inject malicious objects, or disrupt storage operations across all buckets in the Minio deployment, potentially leading to data corruption, service disruption, or lateral movement.
Likely Case
Privileged users or compromised accounts could write unauthorized objects to buckets they shouldn't have access to, violating data segregation and potentially exfiltrating or tampering with sensitive data.
If Mitigated
With proper credential management and access controls, impact is limited to authorized users misusing their legitimate permissions rather than complete system compromise.
🎯 Exploit Status
Exploitation requires valid credentials with specific permissions and enabled Console API access
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: RELEASE.2023-03-20T20-16-18Z and later
Vendor Advisory: https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c
Restart Required: Yes
Instructions:
1. Backup Minio configuration and data. 2. Stop Minio service. 3. Update Minio to version RELEASE.2023-03-20T20-16-18Z or later. 4. Restart Minio service. 5. Verify the update was successful.
🔧 Temporary Workarounds
Disable Console API Access
allTurn off the Minio browser/console API to prevent exploitation
export MINIO_BROWSER=off
Or set MINIO_BROWSER=off in environment/systemd configuration
🧯 If You Can't Patch
- Disable Console API access by setting MINIO_BROWSER=off
- Implement strict IAM policies to limit arn:aws:s3:::* permissions and use least privilege principles
🔍 How to Verify
Check if Vulnerable:
Check Minio version: if earlier than RELEASE.2023-03-20T20-16-18Z and MINIO_BROWSER is enabled, system is vulnerable
Check Version:
minio version
Verify Fix Applied:
Verify Minio version is RELEASE.2023-03-20T20-16-18Z or later using 'minio version' command
📡 Detection & Monitoring
Log Indicators:
- Unusual PostPolicyBucket requests
- Object writes to unexpected buckets
- Failed bucket validation attempts
Network Indicators:
- POST requests to /minio/upload API with manipulated bucket parameters
SIEM Query:
source="minio" AND (http_method="POST" AND uri_path="/minio/upload" AND (bucket_name NOT IN expected_buckets OR contains(bucket_name, "..")))
🔗 References
- https://github.com/minio/minio/commit/67f4ba154a27a1b06e48bfabda38355a010dfca5
- https://github.com/minio/minio/pull/16849
- https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c
- https://github.com/minio/minio/commit/67f4ba154a27a1b06e48bfabda38355a010dfca5
- https://github.com/minio/minio/pull/16849
- https://github.com/minio/minio/security/advisories/GHSA-2pxw-r47w-4p8c
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-28434