Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-28432— Minio Information Disclosure in Cluster Deployment

CVSS 7.5 · High KEV EPSS 94.00% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-28432

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Minio Information Disclosure in Cluster Deployment
Source: NVD (National Vulnerability Database)
Vulnerability Description
Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY` and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
MinIO 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
MinIO是美国MinIO公司的一款开源的对象存储服务器。该产品支持构建用于机器学习、分析和应用程序数据工作负载的基础架构。 MinIO 存在信息泄露漏洞,该漏洞源于在集群部署中MinIO会返回所有环境变量,导致信息泄露。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
miniominio >= RELEASE.2019-12-17T23-16-33Z, < RELEASE.2023-03-20T20-16-18Z -

II. Public POCs for CVE-2023-28432

#POC DescriptionSource LinkShenlong Link
1CVE-2023-28434 nuclei templateshttps://github.com/Mr-xn/CVE-2023-28432POC Details
2MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432) https://github.com/gobysec/CVE-2023-28432POC Details
3CVE-2023-28432,minio未授权访问检测工具https://github.com/Okaytc/minio_unauth_checkPOC Details
4MinIO敏感信息泄露漏洞批量扫描poc&exphttps://github.com/MzzdToT/CVE-2023-28432POC Details
5CVE-2023-28432 POChttps://github.com/acheiii/CVE-2023-28432POC Details
6通过vulhub的复现过程实现了,基本的批量检测。比较垃圾但是勉强能用https://github.com/steponeerror/Cve-2023-28432-POC Details
7CVE-2023-28432 MinIO敏感信息泄露检测脚本https://github.com/Cuerz/CVE-2023-28432POC Details
8minio敏感信息泄露https://github.com/Majus527/MinIO_CVE-2023-28432POC Details
9Nonehttps://github.com/LHXHL/Minio-CVE-2023-28432POC Details
10Test environments for CVE-2023-28432, information disclosure in MinIO clustershttps://github.com/h0ng10/CVE-2023-28432_dockerPOC Details
11Nonehttps://github.com/CHINA-china/MinIO_CVE-2023-28432_EXPPOC Details
12MinIO Information Disclosure Vulnerability scanner by metasploithttps://github.com/TaroballzChen/CVE-2023-28432-metasploit-scannerPOC Details
13CVE-2023-28432检测工具https://github.com/bingtangbanli/CVE-2023-28432POC Details
14Automated vulnerability scanner for CVE-2023-28432 in Minio deployments, revealing sensitive environment variables.https://github.com/Chocapikk/CVE-2023-28432POC Details
15Nonehttps://github.com/yTxZx/CVE-2023-28432POC Details
16https://github.com/AbelChe/evil_minio/tree/main 打包留存https://github.com/Fw-fW-fw/CVE-2023-28432-minio_update_rcePOC Details
17https://github.com/AbelChe/evil_minio/tree/main 打包留存https://github.com/unam4/CVE-2023-28432-minio_update_rcePOC Details
18CVE-2023-28432 Minio Information isclosure Exploithttps://github.com/C1ph3rX13/CVE-2023-28432POC Details
19Nonehttps://github.com/netuseradministrator/CVE-2023-28432POC Details
20minio系统存在信息泄露漏洞,未经身份认证的远程攻击,通过发送特殊POST请求到/minio/bootstrap/v1/verify即可获取所有敏感信息,其中包括MINIO_SECRET_KEY和MINIO_ROOT_PASSWORD,可能导致管理员账号密码泄露。https://github.com/xk-mt/CVE-2023-28432POC Details
21MinIO vulnerability exploit - CVE-2023-28432https://github.com/0xRulez/CVE-2023-28432POC Details
22PoC for CVE-2023-28432https://github.com/fhAnso/CVE-2023-28432POC Details
23MinIO vulnerability exploit - CVE-2023-28432https://github.com/BitWiz4rd/CVE-2023-28432POC Details
24CVE-2023-28432检测工具https://github.com/NET-Flowers/CVE-2023-28432POC Details
25MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-28432.yamlPOC Details
26Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/MinIO%20%E9%9B%86%E7%BE%A4%E6%A8%A1%E5%BC%8F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E%20CVE-2023-28432.mdPOC Details
27https://github.com/vulhub/vulhub/blob/master/minio/CVE-2023-28432/README.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-28432

登录查看更多情报信息。

Same Patch Batch · minio · 2023-03-22 · 3 CVEs total

CVE-2023-284338.8 HIGHMinio Privilege Escalation on Windows via Path separator manipulation
CVE-2023-284348.8 HIGHMinIO is vulnerable to privilege escalation on Linux/MacOS

IV. Related Vulnerabilities

V. Comments for CVE-2023-28432

No comments yet


Leave a comment