MinIO performs incomplete signature validation for unsigned-trailer uploads
Package
Affected versions
< 0.0.0-20250403145552-8c70975283f9
Patched versions
0.0.0-20250403145552-8c70975283f9
Description
Published by the National Vulnerability Database
Apr 3, 2025
Published to the GitHub Advisory Database
Apr 4, 2025
Reviewed
Apr 4, 2025
Impact
This is a high priority vulnerability and users must upgrade ASAP.
The signature component of the authorization may be invalid, which would mean that as a client you can use any arbitrary secret to upload objects given the user already has prior WRITE permissions on the bucket,
Prior knowledge of access-key, and bucket name this user might have access to - and an access-key with a WRITE permissions is necessary.
However with relevant information in place, uploading random objects to buckets is trivial and easy via
curl
Patches
Yes minio/minio#21103
Workarounds
Reject requests with
x-amz-content-sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER
for now at LB layer, ask application users to useSTREAMING-AWS4-HMAC-SHA256-PAYLOAD-TRAILER
References