First published: Mon Dec 27 2021(Updated: )
MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API.
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
MinIO MinIO | <2021-12-27t07-23-18z | |
redhat/RELEASE.2021-12-27T07-23 | <18 | 18 |
<2021-12-27t07-23-18z |
There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43858 has been classified as a high severity vulnerability due to the potential for privilege escalation.
To fix CVE-2021-43858, upgrade to MinIO version RELEASE.2021-12-27T07-23-18Z or later.
CVE-2021-43858 affects MinIO versions prior to RELEASE.2021-12-27T07-23-18Z.
CVE-2021-43858 allows a malicious client to modify user policies, leading to higher privileges and potential misuse.
Yes, CVE-2021-43858 can be exploited remotely through specially crafted HTTP API calls by the malicious client.