Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2023-28434 nuclei templates | https://github.com/Mr-xn/CVE-2023-28432 | POC Details |
| 2 | MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432) | https://github.com/gobysec/CVE-2023-28432 | POC Details |
| 3 | CVE-2023-28432,minio未授权访问检测工具 | https://github.com/Okaytc/minio_unauth_check | POC Details |
| 4 | MinIO敏感信息泄露漏洞批量扫描poc&exp | https://github.com/MzzdToT/CVE-2023-28432 | POC Details |
| 5 | CVE-2023-28432 POC | https://github.com/acheiii/CVE-2023-28432 | POC Details |
| 6 | 通过vulhub的复现过程实现了,基本的批量检测。比较垃圾但是勉强能用 | https://github.com/steponeerror/Cve-2023-28432- | POC Details |
| 7 | CVE-2023-28432 MinIO敏感信息泄露检测脚本 | https://github.com/Cuerz/CVE-2023-28432 | POC Details |
| 8 | minio敏感信息泄露 | https://github.com/Majus527/MinIO_CVE-2023-28432 | POC Details |
| 9 | None | https://github.com/LHXHL/Minio-CVE-2023-28432 | POC Details |
| 10 | Test environments for CVE-2023-28432, information disclosure in MinIO clusters | https://github.com/h0ng10/CVE-2023-28432_docker | POC Details |
| 11 | None | https://github.com/CHINA-china/MinIO_CVE-2023-28432_EXP | POC Details |
| 12 | MinIO Information Disclosure Vulnerability scanner by metasploit | https://github.com/TaroballzChen/CVE-2023-28432-metasploit-scanner | POC Details |
| 13 | CVE-2023-28432检测工具 | https://github.com/bingtangbanli/CVE-2023-28432 | POC Details |
| 14 | Automated vulnerability scanner for CVE-2023-28432 in Minio deployments, revealing sensitive environment variables. | https://github.com/Chocapikk/CVE-2023-28432 | POC Details |
| 15 | None | https://github.com/yTxZx/CVE-2023-28432 | POC Details |
| 16 | https://github.com/AbelChe/evil_minio/tree/main 打包留存 | https://github.com/Fw-fW-fw/CVE-2023-28432-minio_update_rce | POC Details |
| 17 | https://github.com/AbelChe/evil_minio/tree/main 打包留存 | https://github.com/unam4/CVE-2023-28432-minio_update_rce | POC Details |
| 18 | CVE-2023-28432 Minio Information isclosure Exploit | https://github.com/C1ph3rX13/CVE-2023-28432 | POC Details |
| 19 | None | https://github.com/netuseradministrator/CVE-2023-28432 | POC Details |
| 20 | minio系统存在信息泄露漏洞,未经身份认证的远程攻击,通过发送特殊POST请求到/minio/bootstrap/v1/verify即可获取所有敏感信息,其中包括MINIO_SECRET_KEY和MINIO_ROOT_PASSWORD,可能导致管理员账号密码泄露。 | https://github.com/xk-mt/CVE-2023-28432 | POC Details |
| 21 | MinIO vulnerability exploit - CVE-2023-28432 | https://github.com/0xRulez/CVE-2023-28432 | POC Details |
| 22 | PoC for CVE-2023-28432 | https://github.com/fhAnso/CVE-2023-28432 | POC Details |
| 23 | MinIO vulnerability exploit - CVE-2023-28432 | https://github.com/BitWiz4rd/CVE-2023-28432 | POC Details |
| 24 | CVE-2023-28432检测工具 | https://github.com/NET-Flowers/CVE-2023-28432 | POC Details |
| 25 | MinIO is susceptible to information disclosure. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD. An attacker can potentially obtain sensitive information, modify data, and/or execute unauthorized operations without entering necessary credentials. All users of distributed deployment are impacted. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-28432.yaml | POC Details |
| 26 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/MinIO%20%E9%9B%86%E7%BE%A4%E6%A8%A1%E5%BC%8F%E4%BF%A1%E6%81%AF%E6%B3%84%E9%9C%B2%E6%BC%8F%E6%B4%9E%20CVE-2023-28432.md | POC Details |
| 27 | https://github.com/vulhub/vulhub/blob/master/minio/CVE-2023-28432/README.md | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-28433 | 8.8 HIGH | Minio Privilege Escalation on Windows via Path separator manipulation |
| CVE-2023-28434 | 8.8 HIGH | MinIO is vulnerable to privilege escalation on Linux/MacOS |
No comments yet