Learn about CVE-2023-25812, a vulnerability in Minio allowing unauthorized DELETE operations in object-locked buckets. Mitigate this medium risk issue now.
This CVE-2023-25812 pertains to a vulnerability found in Minio, a Multi-Cloud Object Storage framework. The issue involves allowing DELETE operations on resources in object-locked buckets under Governance mode, leading to improper preservation of permissions.
Understanding CVE-2023-25812
This section delves into the details of the CVE-2023-25812 vulnerability found in Minio.
What is CVE-2023-25812?
The vulnerability in Minio arises from affected versions not correctly honoring a
Deny
policy on ByPassGoverance. This results in the system failing to return "Access Denied" to users attempting to DELETE a versionId with the special header X-Amz-Bypass-Governance-Retention: true
. Consequently, objects under governance may be incorrectly deleted as a result of this misconfiguration.
The Impact of CVE-2023-25812
The impact of this vulnerability is medium, with a CVSS v3.1 base score of 6.5. It poses a risk to the integrity of data as attackers can exploit this issue to delete objects in object-locked buckets, bypassing the intended governance restrictions.
Technical Details of CVE-2023-25812
This section provides more technical insights into the CVE-2023-25812 vulnerability in Minio.
Vulnerability Description
The vulnerability originates from the improper handling of permissions, allowing users to delete objects that should be protected under the governance policies in place.
Affected Systems and Versions
The affected system is Minio, specifically versions from
>= RELEASE.2020-04-10T03-34-42Z
to < RELEASE.2023-02-17T17-52-43Z
.
Exploitation Mechanism
Attackers can exploit this vulnerability by sending DELETE requests with a specific header, allowing them to bypass governance restrictions and delete objects that should be protected.
Mitigation and Prevention
To address CVE-2023-25812 in Minio, immediate steps should be taken and long-term security practices should be implemented to prevent further vulnerabilities.
Immediate Steps to Take
All Minio users are strongly advised to upgrade their systems to a version that includes the necessary patch to address this vulnerability. Upgrading will prevent unauthorized deletion of objects under governance mode.
Long-Term Security Practices
In addition to patching, organizations should regularly review and update their security configurations to ensure that proper permissions and policies are enforced to prevent unauthorized access and modifications.
Patching and Updates
Minio has released patches to address this vulnerability. Users should refer to the provided references to apply the relevant updates and secure their systems against CVE-2023-25812.