Skip to content

Security Incident Report - Minio Vulnerability

Critical
keyvaann published GHSA-5f4g-7q2x-v4vj Jul 19, 2023

Package

Minio (Radar-Kubernetes )

Affected versions

v1.1.2

Patched versions

v1.1.3

Description

Issue

A critical vulnerability was identified in the version of Minio utilized in our applications. This issue could potentially grant unauthorized access to the output data of application processes stored in Minio.

Impact

This vulnerability significantly impacts users of our application who utilize Minio for storage. It may lead to unauthorized access to or manipulation of the output data from application processes. Users who use managed object storage solutions, such as AWS S3, are not affected. The rest of the application functionalities are not impacted.

Patches

Users are advised to upgrade their RADAR-Kubernetes to version v1.1.3, which includes the latest, secure version of Minio. Before the upgrade make sure to update s3_access_key and s3_secret_key variables with new secrets and then run:
helmfile -f helmfile.d/20-s3.yaml -l name=radar-output -l name=radar-s3-connector -l name=minio sync
After the upgrade inspect the Minio and check for any suspicious change. Also make sure there aren't any extra users created on the Minio and ideally reset password for all users.

Workarounds

If an immediate upgrade is not possible, users can mitigate the vulnerability by deleting the Ingress definition for the Minio API with the command: kubectl delete ingress minio-api. Additionally, users should change the root password of their Minio to revoke any unauthorized access. However, note that the workaround involving the command will cause the mc client and any APIs accessing Minio to cease functioning until the upgrade is complete.

References

For more detailed information about the vulnerability, users can visit the following links:

Regular checks on these sites for updates and potential vulnerabilities are advised for all users.

Severity

Critical

CVE ID

CVE-2023-28432

Weaknesses

No CWEs