<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Minio — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/minio/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 00:05:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/minio/feed.xml" rel="self" type="application/rss+xml"/><item><title>MinIO Unauthenticated Object Write Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-minio-auth-bypass/</link><pubDate>Tue, 14 Apr 2026 00:05:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-minio-auth-bypass/</guid><description>Two authentication bypass vulnerabilities in MinIO allow writing arbitrary objects to any bucket with only a valid access key, without the secret key or valid signature, impacting all MinIO deployments.</description><content:encoded><![CDATA[<p>MinIO is susceptible to two authentication bypass vulnerabilities affecting all deployments up to AIStor RELEASE.2026-04-11T03-20-12Z. The vulnerability lies within the <code>STREAMING-UNSIGNED-PAYLOAD-TRAILER</code> code path. An attacker possessing a valid access key (including the default <code>minioadmin</code> or any key with WRITE permissions) can exploit these flaws to write arbitrary objects to any bucket. This bypass eliminates the need for the secret key or a valid cryptographic signature. One vulnerability involves missing signature verification in <code>PutObjectExtractHandler</code>, while the other bypasses signature verification using query-string credentials. These issues stem from the introduction of <code>authTypeStreamingUnsignedTrailer</code> support in commit 76913a9fd, specifically impacting releases from RELEASE.2023-05-18T00-05-36Z onwards.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains a valid MinIO access key, either through default credentials or compromised accounts.</li>
<li>For vulnerability 1, the attacker crafts a PUT request with <code>X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER</code>, <code>X-Amz-Meta-Snowball-Auto-Extract: true</code>, and an <code>Authorization</code> header containing the valid access key but a fabricated signature.</li>
<li>The request is sent to the MinIO server&rsquo;s <code>PutObjectExtractHandler</code> endpoint.</li>
<li>Due to the missing signature verification in the <code>PutObjectExtractHandler</code>, the request proceeds without proper authentication.</li>
<li>The server extracts the access key and checks IAM permissions via <code>isPutActionAllowed</code>, but the fabricated signature is not validated.</li>
<li>The server accepts the request, and the attacker-controlled payload is extracted into the target bucket.</li>
<li>For vulnerability 2, the attacker crafts a PUT or PUT Part request omitting the <code>Authorization</code> header.</li>
<li>The attacker includes authentication credentials (access key) exclusively via the <code>X-Amz-Credential</code> query parameter. Since the <code>Authorization</code> header is missing, signature verification is skipped, and the request proceeds with the permissions of the impersonated access key, allowing the attacker to write arbitrary objects.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows unauthorized users to modify objects within MinIO storage buckets, potentially leading to data breaches, service disruptions, or the injection of malicious content. Any MinIO deployment is affected, creating a widespread risk for organizations relying on MinIO for their storage infrastructure. The CVSS v4.0 score of 8.8 (High) highlights the severity and potential impact of these vulnerabilities. The number of victims depends on the adoption rate of vulnerable MinIO versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to MinIO AIStor version <code>RELEASE.2026-04-11T03-20-12Z</code> or later, as indicated in the <a href="https://docs.min.io/enterprise/aistor-object-store/upgrade-aistor-server/community-edition/">MinIO AIStor documentation</a>.</li>
<li>Implement a block at the load balancer or reverse proxy to reject any requests containing <code>X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER</code>, as mentioned in the <strong>Workarounds</strong> section.</li>
<li>Deploy the Sigma rule <code>Detect MinIO Unsigned Payload Trailer</code> to identify exploitation attempts based on the presence of the vulnerable header.</li>
<li>Review and restrict WRITE permissions (<code>s3:PutObject</code>) to trusted principals to reduce the attack surface as described in the <strong>Workarounds</strong> section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>minio</category><category>authentication-bypass</category><category>object-storage</category></item><item><title>MinIO S3 Select CSV Parsing Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-04-minio-dos/</link><pubDate>Thu, 09 Apr 2026 17:32:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-minio-dos/</guid><description>MinIO's S3 Select feature is vulnerable to denial of service due to unbounded memory allocation when processing CSV files without newlines, leading to memory exhaustion and server crashes.</description><content:encoded><![CDATA[<p>MinIO, an open-source object storage server, is susceptible to a denial-of-service (DoS) vulnerability within its S3 Select functionality. This flaw, present since the introduction of S3 Select support in commit 7c14cdb60e53dbfdad2be644dfb180cab19fffa7 (included in releases since RELEASE.2018-08-18T03-49-57Z), stems from unbounded memory allocation when parsing CSV files. Any authenticated user possessing both <code>s3:PutObject</code> and <code>s3:GetObject</code> permissions can exploit this vulnerability by uploading a specially crafted CSV file lacking newline characters. A relatively small, gzip-compressed CSV file (around 2MB) can decompress into gigabytes of data, triggering excessive memory consumption and causing the MinIO server process to crash. Defenders should upgrade to MinIO AIStor RELEASE.2025-12-20T04-58-37Z or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the MinIO server with valid credentials, having both <code>s3:PutObject</code> and <code>s3:GetObject</code> permissions.</li>
<li>The attacker crafts a malicious CSV file. This file intentionally lacks newline characters and may be compressed using gzip to maximize its impact.</li>
<li>The attacker uploads the malicious CSV file to a MinIO bucket using the <code>s3:PutObject</code> permission.</li>
<li>The attacker then sends an S3 Select <code>GetObject</code> request to the MinIO server, specifying the malicious CSV file as the target. This triggers the vulnerable CSV parsing logic.</li>
<li>The <code>nextSplit()</code> function in <code>internal/s3select/csv/reader.go</code> attempts to read the CSV file line by line, using <code>bufio.Reader.ReadBytes('\n')</code>.</li>
<li>Due to the absence of newline characters, the function reads the entire file into memory without any size limitation, leading to unbounded memory allocation.</li>
<li>The excessive memory consumption leads to an out-of-memory (OOM) condition on the MinIO server.</li>
<li>The MinIO server process crashes, resulting in a denial of service for all users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, rendering the MinIO server unavailable. The attacker can repeatedly trigger the vulnerability, causing prolonged disruption to the service. The vulnerability affects all MinIO deployments using versions RELEASE.2018-08-18T03-49-57Z up to RELEASE.2025-12-03T08-12-39Z. The number of affected installations is unknown. Sectors using MinIO for object storage are vulnerable. If successful, this attack could interrupt services reliant on the object storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to MinIO AIStor version RELEASE.2025-12-20T04-58-37Z or later to remediate the vulnerability as documented in the advisory.</li>
<li>If upgrading is not immediately feasible, disable S3 Select access via IAM policies, specifically denying <code>s3:GetObject</code> actions or <code>SelectObjectContent</code> requests as described in the &ldquo;Workarounds&rdquo; section of the advisory.</li>
<li>Monitor MinIO server resource consumption, particularly memory usage, to detect potential exploitation attempts. Deploy the provided Sigma rule to detect potential DoS attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dos</category><category>minio</category><category>s3select</category></item><item><title>MinIO SSE Metadata Injection via Replication Headers Leads to Data Unreadability</title><link>https://feed.craftedsignal.io/briefs/2024-05-minio-metadata-injection/</link><pubDate>Fri, 27 Mar 2026 22:26:05 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-05-minio-metadata-injection/</guid><description>A vulnerability in MinIO allows authenticated users with `s3:PutObject` permission to inject internal server-side encryption metadata into objects via crafted replication headers, leading to permanent data unreadability.</description><content:encoded><![CDATA[<p>A flaw in MinIO&rsquo;s <code>extractMetadataFromMime()</code> function allows any authenticated user with <code>s3:PutObject</code> permission to inject internal server-side encryption (SSE) metadata into objects. This is achieved by sending crafted <code>X-Minio-Replication-*</code> headers on a normal PutObject request. The MinIO server incorrectly maps these headers to <code>X-Minio-Internal-*</code> encryption metadata without validating if the request is a legitimate replication request. Objects written in this manner contain bogus encryption keys and become permanently unreadable through the S3 API. This vulnerability affects all MinIO releases up to the final release of the <code>minio/minio</code> open-source project, specifically versions introduced after commit <code>468a9fae83e965ecefa1c1fdc2fc57b84ece95b0</code> (included in <code>RELEASE.2024-03-30T09-41-56Z</code>). It was resolved in MinIO AIStor <code>RELEASE.2026-03-26T21-24-40Z</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to the MinIO server with valid credentials having <code>s3:PutObject</code> permissions.</li>
<li>The attacker crafts a malicious PutObject request targeting a specific bucket and object key.</li>
<li>The attacker includes <code>X-Minio-Replication-Server-Side-Encryption-*</code> headers in the PutObject request.</li>
<li>The attacker omits the <code>X-Minio-Source-Replication-Request</code> header, which would normally indicate a legitimate replication request.</li>
<li>The MinIO server&rsquo;s <code>extractMetadataFromMime()</code> function incorrectly maps the crafted <code>X-Minio-Replication-*</code> headers to <code>X-Minio-Internal-Server-Side-Encryption-*</code> headers.</li>
<li>The server writes the object metadata, including the bogus encryption keys, to the object storage.</li>
<li>Subsequent GetObject or HeadObject requests for the modified object will fail because the server treats the object as encrypted with non-existent or incorrect keys.</li>
<li>The attacker achieves a targeted denial-of-service, rendering the object permanently unreadable via the S3 API.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This vulnerability enables a targeted denial-of-service attack. An attacker can selectively corrupt individual objects or entire buckets within a MinIO deployment. Successful exploitation results in permanent data loss, as affected objects become unreadable through the S3 API. This can disrupt critical services relying on the object storage and potentially impact a large number of users if entire buckets are targeted.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to MinIO AIStor version <code>RELEASE.2026-03-26T21-24-40Z</code> or later to patch the vulnerability as documented in the <a href="https://docs.min.io/enterprise/aistor-object-store/upgrade-aistor-server/community-edition/">release notes</a>.</li>
<li>Implement a reverse proxy or load balancer rule to drop or reject any request containing <code>X-Minio-Replication-Server-Side-Encryption-*</code> headers that does not also include <code>X-Minio-Source-Replication-Request</code>, mitigating the injection path as described in the <a href="#workarounds">Workarounds</a> section.</li>
<li>Review and restrict IAM policies to limit <code>s3:PutObject</code> grants to trusted principals only, reducing the attack surface as noted in the <a href="#workarounds">Workarounds</a> section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>minio</category><category>s3</category><category>metadata-injection</category><category>denial-of-service</category></item></channel></rss>