First published: Wed Oct 13 2021(Updated: )
Minio is a Kubernetes native application for cloud storage. All users on release `RELEASE.2021-10-10T16-53-30Z` are affected by a vulnerability that involves bypassing policy restrictions on regular users. Normally, checkKeyValid() should return owner true for rootCreds. In the affected version, policy restriction did not work properly for users who did not have service (svc) or security token service (STS) accounts. This issue is fixed in `RELEASE.2021-10-13T00-23-17Z`. A downgrade back to release `RELEASE.2021-10-08T23-58-24Z` is available as a workaround.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
MinIO MinIO | =2021-10-10t16-53-30z | |
=2021-10-10t16-53-30z |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41137 has been classified as a high-severity vulnerability due to its potential to bypass policy restrictions.
To fix CVE-2021-41137, users should upgrade MinIO to a version released after 2021-10-10T16-53-30Z that addresses this vulnerability.
All users of MinIO on the release 2021-10-10T16-53-30Z are affected by CVE-2021-41137.
CVE-2021-41137 represents a policy bypass vulnerability that affects regular user permissions.
The impact of CVE-2021-41137 allows regular users to potentially gain unauthorized access to resources due to bypassing expected policy restrictions.