Server-side Request Forgery (SSRF) Affecting github.com/minio/minio/cmd package, versions *


0.0
medium
  • Attack Complexity

    Low

  • Privileges Required

    High

  • Confidentiality

    High

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-GOLANG-GITHUBCOMMINIOMINIOCMD-1066411

  • published

    2 Feb 2021

  • disclosed

    2 Feb 2021

  • credit

    Unknown

How to fix?

A fix was pushed into the master branch but not yet published.

Overview

github.com/minio/minio/cmd is an open source object storage server compatible with Amazon S3 APIs.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF). The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed.

Note: This vulnerability was resolved in version RELEASE.2021-01-30T00-20-58Z.