Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

x/vulndb: potential Go vuln in github.com/minio/minio: CVE-2021-43858 #285

Closed
GoVulnBot opened this issue Feb 4, 2022 · 1 comment
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module.

Comments

@GoVulnBot
Copy link

In CVE-2021-43858, the reference URL github.com/minio/minio (and possibly others) refers to something in Go.

module: github.com/minio/minio
package: minio
description: |
    MinIO is a Kubernetes native application for cloud storage. Prior to version `RELEASE.2021-12-27T07-23-18Z`, a malicious client can hand-craft an HTTP API call that allows for updating policy for a user and gaining higher privileges. The patch in version `RELEASE.2021-12-27T07-23-18Z` changes the accepted request body type and removes the ability to apply policy changes through this API. There is a workaround for this vulnerability: Changing passwords can be disabled by adding an explicit `Deny` rule to disable the API for users.
cves:
  - CVE-2021-43858
links:
    pr: https://github.com/minio/minio/pull/7949
    commit: https://github.com/minio/minio/commit/5a96cbbeaabd0a82b0fe881378e7c21c85091abf
    context:
      - https://github.com/minio/minio/releases/tag/RELEASE.2021-12-27T07-23-18Z
      - https://github.com/minio/minio/security/advisories/GHSA-j6jc-jqqc-p6cx

See doc/triage.md for instructions on how to triage this report.

@neild neild added excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module. and removed NotGoVuln labels Aug 11, 2022
@gopherbot
Copy link
Contributor

Change https://go.dev/cl/592766 mentions this issue: data/reports: unexclude 50 reports

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
excluded: EFFECTIVELY_PRIVATE This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
Projects
None yet
Development

No branches or pull requests

4 participants