Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2022-35919 : Exploit Details and Defense Strategies

CVE-2022-35919 involves a path traversal vulnerability in MinIO, allowing 'admin' users to access contents at arbitrary paths. Learn about the impact, affected versions, and mitigation steps.

Authenticated requests for server update admin API allows path traversal in MinIO

Understanding CVE-2022-35919

MinIO is a High Performance Object Storage system under GNU Affero General Public License v3.0. This CVE involves a vulnerability where 'admin' users can trigger an error that discloses the content of the requested path.

What is CVE-2022-35919?

In affected versions, 'admin' users with 'admin:ServerUpdate' authorization can exploit a path traversal vulnerability that allows access to contents at arbitrary paths readable by the MinIO process.

The Impact of CVE-2022-35919

The vulnerability can be exploited by authenticated users to access sensitive information stored on the server, leading to a potential compromise of data confidentiality, integrity, and availability.

Technical Details of CVE-2022-35919

Vulnerability Description

The vulnerability arises from improper limitation of a pathname to a restricted directory ('Path Traversal') in MinIO, leading to unauthorized access to files and directories.

Affected Systems and Versions

The vulnerability affects all MinIO versions prior to RELEASE.2022-07-29T19-40-48Z.

Exploitation Mechanism

Authenticated 'admin' users with 'admin:ServerUpdate' authorization can exploit the path traversal vulnerability to read contents from arbitrary paths readable by the MinIO process.

Mitigation and Prevention

Immediate Steps to Take

Users are advised to upgrade to the latest version of MinIO to patch the vulnerability. If upgrading is not possible immediately, administrators can mitigate the risk by denying the 'admin:ServerUpdate' action for admin users through IAM policies.

Long-Term Security Practices

Implement least privilege access controls, regularly monitor server logs for suspicious activities, and conduct security assessments to identify and address vulnerabilities.

Patching and Updates

MinIO users should regularly check for security advisories and updates from the official MinIO repository to ensure their systems are protected from known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now