vulnerability
Minio Aistor: CVE-2023-28432: Exposure of Sensitive Information to an Unauthorized Actor
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | 2023-03-22 | 2025-04-30 | 2025-05-01 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
2023-03-22
Added
2025-04-30
Modified
2025-05-01
Description
Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including `MINIO_SECRET_KEY`
and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
and `MINIO_ROOT_PASSWORD`, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.
Solution
minio-aistor-upgrade-latest
References
- CVE-2023-28432
- https://attackerkb.com/topics/CVE-2023-28432
- URL-https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q
- URL-https://github.com/minio/minio/releases/tag/RELEASE.2023-03-20T20-16-18Z
- URL-https://twitter.com/Andrew___Morris/status/1639325397241278464
- URL-https://viz.greynoise.io/tag/minio-information-disclosure-attempt
- URL-https://www.greynoise.io/blog/openai-minio-and-why-you-should-always-use-docker-cli-scan-to-keep-your-supply-chain-clean

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.