Bug 2036252 (CVE-2021-43858)
Summary: | CVE-2021-43858 minio: user privilege escalation in AddUser() admin API | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Guilherme de Almeida Suckevicz <gsuckevi> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | caswilli, code, crarobin, go-sig, gparvin, jburrell, jmadigan, jramanat, kaycoth, ngough, njean, pahickey, pamccart, stcannon, vkumar |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | RELEASE.2021-12-27T07-23-18Z | Doc Type: | If docs needed, set a value |
Doc Text: |
MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-06-09 04:49:39 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2036253, 2038206, 2038207, 2038208, 2038209, 2038210, 2038211, 2038212, 2038213, 2038214, 2038215, 2038216, 2038217, 2038218, 2038219, 2038220, 2038221, 2038222, 2038223, 2038224, 2038225, 2038226, 2038227, 2038228, 2038229, 2038230, 2038231, 2038232, 2038233, 2038234, 2038235, 2038236, 2040439 | ||
Bug Blocks: | 2036258 |
Description
Guilherme de Almeida Suckevicz
2021-12-30 17:55:58 UTC
Created golang-github-minio tracking bugs for this issue: Affects: fedora-all [bug 2036253] This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.4 for RHEL 8 Via RHSA-2022:0735 https://access.redhat.com/errata/RHSA-2022:0735 This issue has been addressed in the following products: Red Hat Advanced Cluster Management for Kubernetes 2.5 for RHEL 8 Via RHSA-2022:4956 https://access.redhat.com/errata/RHSA-2022:4956 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-43858 |