CVE-2021-21390

Name
CVE-2021-21390
Description
MinIO is an open-source high performance object storage service and it is API compatible with Amazon S3 cloud storage service. In MinIO before version RELEASE.2021-03-17T02-33-02Z, there is a vulnerability which enables MITM modification of request bodies that are meant to have integrity guaranteed by chunk signatures. In a PUT request using aws-chunked encoding, MinIO ordinarily verifies signatures at the end of a chunk. This check can be skipped if the client sends a false chunk size that is much greater than the actual data sent: the server accepts and completes the request without ever reaching the end of the chunk + thereby without ever checking the chunk signature. This is fixed in version RELEASE.2021-03-17T02-33-02Z. As a workaround one can avoid using "aws-chunked" encoding-based chunk signature upload requests instead use TLS. MinIO SDKs automatically disable chunked encoding signature when the server endpoint is configured with TLS.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://github.com/minio/minio/commit/e197800f9055489415b53cf137e31e194aaf7ba0
Exploit https://github.com/minio/minio/pull/11801
Exploit https://github.com/minio/minio/security/advisories/GHSA-xr7r-7gpj-5pgp

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:* minio >= None < 2021-03-17t02-33-02z

Vulnerable and fixed packages

Source package Branch Version Maintainer Status
minio 3.17-community 0.20221029.062133-r5 Drew DeVault <sir@cmpwn.com> possibly vulnerable
minio 3.18-community 0.20230920.224955-r2 Celeste <cielesti@protonmail.com> possibly vulnerable
minio 3.19-community 0.20240131.202033-r3 Celeste <cielesti@protonmail.com> possibly vulnerable
minio 3.20-community 0.20240527.191746-r2 Celeste <cielesti@protonmail.com> possibly vulnerable
minio edge-community 0.20240829.014052-r0 Celeste <cielesti@protonmail.com> possibly vulnerable