vulnerability
Arch Linux: Access restriction bypass (CVE-2021-21362)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:L/Au:S/C:N/I:P/A:N) | Mar 8, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
4
CVSS
(AV:N/AC:L/Au:S/C:N/I:P/A:N)
Published
Mar 8, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
In MinIO before version RELEASE.2021-03-04T00-53-13Z it is possible to bypass a readOnly policy by creating a temporary 'mc share upload' URL. Everyone using MinIO multi-users is impacted.
As a workaround, one can disable uploads with `Content-Type: multipart/form-data` as mentioned in the S3 API RESTObjectPOST docs by using a proxy in front of MinIO.
As a workaround, one can disable uploads with `Content-Type: multipart/form-data` as mentioned in the S3 API RESTObjectPOST docs by using a proxy in front of MinIO.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-21362
- https://attackerkb.com/topics/CVE-2021-21362
- URL-https://github.com/minio/minio/commit/039f59b552319fcc2f83631bb421a7d4b82bc482
- URL-https://github.com/minio/minio/pull/11682
- URL-https://github.com/minio/minio/releases/tag/RELEASE.2021-03-04T00-53-13Z
- URL-https://github.com/minio/minio/security/advisories/GHSA-hq5j-6r98-9m8v
- URL-https://security.archlinux.org/ASA-202103-5
- CWE-285
- CWE-863
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.