<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Object-Storage — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/object-storage/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 14 Apr 2026 00:05:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/object-storage/feed.xml" rel="self" type="application/rss+xml"/><item><title>MinIO Unauthenticated Object Write Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-minio-auth-bypass/</link><pubDate>Tue, 14 Apr 2026 00:05:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-minio-auth-bypass/</guid><description>Two authentication bypass vulnerabilities in MinIO allow writing arbitrary objects to any bucket with only a valid access key, without the secret key or valid signature, impacting all MinIO deployments.</description><content:encoded><![CDATA[<p>MinIO is susceptible to two authentication bypass vulnerabilities affecting all deployments up to AIStor RELEASE.2026-04-11T03-20-12Z. The vulnerability lies within the <code>STREAMING-UNSIGNED-PAYLOAD-TRAILER</code> code path. An attacker possessing a valid access key (including the default <code>minioadmin</code> or any key with WRITE permissions) can exploit these flaws to write arbitrary objects to any bucket. This bypass eliminates the need for the secret key or a valid cryptographic signature. One vulnerability involves missing signature verification in <code>PutObjectExtractHandler</code>, while the other bypasses signature verification using query-string credentials. These issues stem from the introduction of <code>authTypeStreamingUnsignedTrailer</code> support in commit 76913a9fd, specifically impacting releases from RELEASE.2023-05-18T00-05-36Z onwards.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker obtains a valid MinIO access key, either through default credentials or compromised accounts.</li>
<li>For vulnerability 1, the attacker crafts a PUT request with <code>X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER</code>, <code>X-Amz-Meta-Snowball-Auto-Extract: true</code>, and an <code>Authorization</code> header containing the valid access key but a fabricated signature.</li>
<li>The request is sent to the MinIO server&rsquo;s <code>PutObjectExtractHandler</code> endpoint.</li>
<li>Due to the missing signature verification in the <code>PutObjectExtractHandler</code>, the request proceeds without proper authentication.</li>
<li>The server extracts the access key and checks IAM permissions via <code>isPutActionAllowed</code>, but the fabricated signature is not validated.</li>
<li>The server accepts the request, and the attacker-controlled payload is extracted into the target bucket.</li>
<li>For vulnerability 2, the attacker crafts a PUT or PUT Part request omitting the <code>Authorization</code> header.</li>
<li>The attacker includes authentication credentials (access key) exclusively via the <code>X-Amz-Credential</code> query parameter. Since the <code>Authorization</code> header is missing, signature verification is skipped, and the request proceeds with the permissions of the impersonated access key, allowing the attacker to write arbitrary objects.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows unauthorized users to modify objects within MinIO storage buckets, potentially leading to data breaches, service disruptions, or the injection of malicious content. Any MinIO deployment is affected, creating a widespread risk for organizations relying on MinIO for their storage infrastructure. The CVSS v4.0 score of 8.8 (High) highlights the severity and potential impact of these vulnerabilities. The number of victims depends on the adoption rate of vulnerable MinIO versions.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to MinIO AIStor version <code>RELEASE.2026-04-11T03-20-12Z</code> or later, as indicated in the <a href="https://docs.min.io/enterprise/aistor-object-store/upgrade-aistor-server/community-edition/">MinIO AIStor documentation</a>.</li>
<li>Implement a block at the load balancer or reverse proxy to reject any requests containing <code>X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER</code>, as mentioned in the <strong>Workarounds</strong> section.</li>
<li>Deploy the Sigma rule <code>Detect MinIO Unsigned Payload Trailer</code> to identify exploitation attempts based on the presence of the vulnerable header.</li>
<li>Review and restrict WRITE permissions (<code>s3:PutObject</code>) to trusted principals to reduce the attack surface as described in the <strong>Workarounds</strong> section.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>minio</category><category>authentication-bypass</category><category>object-storage</category></item></channel></rss>