Snyk has a published code exploit for this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsA fix was pushed into the master
branch but not yet published.
github.com/minio/minio/cmd is an open source object storage server compatible with Amazon S3 APIs.
Affected versions of this package are vulnerable to Path Traversal which allows users authorized for admin:ServerUpdate
to selectively trigger an error that in response, returns the content of the path requested.
Note: The issue was resolved since version RELEASE.2022-07-29T19-40-48Z
mc admin update alias/ /etc/passwd
The error response will contain the contents of the /etc/passwd
file.
Disabling the ServerUpdate
API by denying the admin:ServerUpdate
action for your admin users via IAM
policies.