Server-side Request Forgery (SSRF) Affecting github.com/minio/minio/cmd package, versions *


0.0
medium

Snyk CVSS

    Attack Complexity Low
    Privileges Required High
    Confidentiality High

    Threat Intelligence

    Exploit Maturity Proof of concept
    EPSS 97.23% (100th percentile)
Expand this section
NVD
7.7 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-GOLANG-GITHUBCOMMINIOMINIOCMD-1066411
  • published 2 Feb 2021
  • disclosed 2 Feb 2021
  • credit Unknown

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

github.com/minio/minio/cmd is an open source object storage server compatible with Amazon S3 APIs.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed.

Note: This vulnerability was resolved in version RELEASE.2021-01-30T00-20-58Z.