Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2024-24747 — Improper Privilege Management in Minio
Severity
8.8HIGHNVD
EPSS
27.1%
top 3.61%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 31
Latest updateJun 28
Description
MinIO is a High Performance Object Storage. When someone creates an access key, it inherits the permissions of the parent key. Not only for `s3:*` actions, but also `admin:*` actions. Which means unless somewhere above in the access-key hierarchy, the `admin` rights are denied, access keys will be able to simply override their own `s3` permissions to something more permissive. The vulnerability is fixed in RELEASE.2024-01-31T20-20-33Z.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages3 packages
Patches
🔴Vulnerability Details
3OSV▶
Minio unsafe default: Access keys inherit `admin` of root user, allowing privilege escalation in github.com/minio/minio↗2024-06-28
GHSA▶
Minio unsafe default: Access keys inherit `admin` of root user, allowing privilege escalation↗2024-02-01
OSV▶
Minio unsafe default: Access keys inherit `admin` of root user, allowing privilege escalation↗2024-02-01