<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Metadata-Injection — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/metadata-injection/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 27 Mar 2026 22:26:05 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/metadata-injection/feed.xml" rel="self" type="application/rss+xml"/><item><title>MinIO SSE Metadata Injection via Replication Headers Leads to Data Unreadability</title><link>https://feed.craftedsignal.io/briefs/2024-05-minio-metadata-injection/</link><pubDate>Fri, 27 Mar 2026 22:26:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-minio-metadata-injection/</guid><description>A vulnerability in MinIO allows authenticated users with `s3:PutObject` permission to inject internal server-side encryption metadata into objects via crafted replication headers, leading to permanent data unreadability.</description><content:encoded><![CDATA[<p>A flaw in MinIO&rsquo;s <code>extractMetadataFromMime()</code> function allows any authenticated user with <code>s3:PutObject</code> permission to inject internal server-side encryption (SSE) metadata into objects. This is achieved by sending crafted <code>X-Minio-Replication-*</code> headers on a normal PutObject request. The MinIO server incorrectly maps these headers to <code>X-Minio-Internal-*</code> encryption metadata without validating if the request is a legitimate replication request. Objects written in this manner contain bogus encryption keys and become permanently unreadable through the S3 API. This vulnerability affects all MinIO releases up to the final release of the <code>minio/minio</code> open-source project, specifically versions introduced after commit <code>468a9fae83e965ecefa1c1fdc2fc57b84ece95b0</code> (included in <code>RELEASE.2024-03-30T09-41-56Z</code>). It was resolved in MinIO AIStor <code>RELEASE.2026-03-26T21-24-40Z</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the MinIO server with valid credentials having <code>s3:PutObject</code> permissions.</li>
<li>The attacker crafts a malicious PutObject request targeting a specific bucket and object key.</li>
<li>The attacker includes <code>X-Minio-Replication-Server-Side-Encryption-*</code> headers in the PutObject request.</li>
<li>The attacker omits the <code>X-Minio-Source-Replication-Request</code> header, which would normally indicate a legitimate replication request.</li>
<li>The MinIO server&rsquo;s <code>extractMetadataFromMime()</code> function incorrectly maps the crafted <code>X-Minio-Replication-*</code> headers to <code>X-Minio-Internal-Server-Side-Encryption-*</code> headers.</li>
<li>The server writes the object metadata, including the bogus encryption keys, to the object storage.</li>
<li>Subsequent GetObject or HeadObject requests for the modified object will fail because the server treats the object as encrypted with non-existent or incorrect keys.</li>
<li>The attacker achieves a targeted denial-of-service, rendering the object permanently unreadable via the S3 API.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability enables a targeted denial-of-service attack. An attacker can selectively corrupt individual objects or entire buckets within a MinIO deployment. Successful exploitation results in permanent data loss, as affected objects become unreadable through the S3 API. This can disrupt critical services relying on the object storage and potentially impact a large number of users if entire buckets are targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to MinIO AIStor version <code>RELEASE.2026-03-26T21-24-40Z</code> or later to patch the vulnerability as documented in the <a href="https://docs.min.io/enterprise/aistor-object-store/upgrade-aistor-server/community-edition/">release notes</a>.</li>
<li>Implement a reverse proxy or load balancer rule to drop or reject any request containing <code>X-Minio-Replication-Server-Side-Encryption-*</code> headers that does not also include <code>X-Minio-Source-Replication-Request</code>, mitigating the injection path as described in the <a href="#workarounds">Workarounds</a> section.</li>
<li>Review and restrict IAM policies to limit <code>s3:PutObject</code> grants to trusted principals only, reducing the attack surface as noted in the <a href="#workarounds">Workarounds</a> section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>minio</category><category>s3</category><category>metadata-injection</category><category>denial-of-service</category></item></channel></rss>