CVE-2021-41137
Summary
| CVE | CVE-2021-41137 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-10-13 14:15:00 UTC |
| Updated | 2022-08-12 16:29:00 UTC |
| Description | Minio is a Kubernetes native application for cloud storage. All users on release `RELEASE.2021-10-10T16-53-30Z` are affected by a vulnerability that involves bypassing policy restrictions on regular users. Normally, checkKeyValid() should return owner true for rootCreds. In the affected version, policy restriction did not work properly for users who did not have service (svc) or security token service (STS) accounts. This issue is fixed in `RELEASE.2021-10-13T00-23-17Z`. A downgrade back to release `RELEASE.2021-10-08T23-58-24Z` is available as a workaround. |
Risk And Classification
Problem Types: NVD-CWE-Other
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| checkKeyValid() should return owner true for rootCreds (#13422) · minio/minio@415bbc7 · GitHub | MISC | github.com | |
| Bypassing policy restrictions on regular users · Advisory · minio/minio · GitHub | CONFIRM | github.com | |
| fix: disallow invalid x-amz-security-token for root credentials by harshavardhana · Pull Request #13388 · minio/minio · GitHub | MISC | github.com | |
| checkKeyValid() should return owner true for rootCreds by harshavardhana · Pull Request #13422 · minio/minio · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 690243 Free Berkeley Software Distribution (FreeBSD) Security Update for minio (f4b15f7d-d33a-4cd0-a97b-709d6af0e43e)