<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>S3select — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/s3select/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 09 Apr 2026 17:32:31 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/s3select/feed.xml" rel="self" type="application/rss+xml"/><item><title>MinIO S3 Select CSV Parsing Denial of Service</title><link>https://feed.craftedsignal.io/briefs/2026-04-minio-dos/</link><pubDate>Thu, 09 Apr 2026 17:32:31 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-minio-dos/</guid><description>MinIO's S3 Select feature is vulnerable to denial of service due to unbounded memory allocation when processing CSV files without newlines, leading to memory exhaustion and server crashes.</description><content:encoded><![CDATA[<p>MinIO, an open-source object storage server, is susceptible to a denial-of-service (DoS) vulnerability within its S3 Select functionality. This flaw, present since the introduction of S3 Select support in commit 7c14cdb60e53dbfdad2be644dfb180cab19fffa7 (included in releases since RELEASE.2018-08-18T03-49-57Z), stems from unbounded memory allocation when parsing CSV files. Any authenticated user possessing both <code>s3:PutObject</code> and <code>s3:GetObject</code> permissions can exploit this vulnerability by uploading a specially crafted CSV file lacking newline characters. A relatively small, gzip-compressed CSV file (around 2MB) can decompress into gigabytes of data, triggering excessive memory consumption and causing the MinIO server process to crash. Defenders should upgrade to MinIO AIStor RELEASE.2025-12-20T04-58-37Z or later.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the MinIO server with valid credentials, having both <code>s3:PutObject</code> and <code>s3:GetObject</code> permissions.</li>
<li>The attacker crafts a malicious CSV file. This file intentionally lacks newline characters and may be compressed using gzip to maximize its impact.</li>
<li>The attacker uploads the malicious CSV file to a MinIO bucket using the <code>s3:PutObject</code> permission.</li>
<li>The attacker then sends an S3 Select <code>GetObject</code> request to the MinIO server, specifying the malicious CSV file as the target. This triggers the vulnerable CSV parsing logic.</li>
<li>The <code>nextSplit()</code> function in <code>internal/s3select/csv/reader.go</code> attempts to read the CSV file line by line, using <code>bufio.Reader.ReadBytes('\n')</code>.</li>
<li>Due to the absence of newline characters, the function reads the entire file into memory without any size limitation, leading to unbounded memory allocation.</li>
<li>The excessive memory consumption leads to an out-of-memory (OOM) condition on the MinIO server.</li>
<li>The MinIO server process crashes, resulting in a denial of service for all users.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability results in a denial-of-service condition, rendering the MinIO server unavailable. The attacker can repeatedly trigger the vulnerability, causing prolonged disruption to the service. The vulnerability affects all MinIO deployments using versions RELEASE.2018-08-18T03-49-57Z up to RELEASE.2025-12-03T08-12-39Z. The number of affected installations is unknown. Sectors using MinIO for object storage are vulnerable. If successful, this attack could interrupt services reliant on the object storage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to MinIO AIStor version RELEASE.2025-12-20T04-58-37Z or later to remediate the vulnerability as documented in the advisory.</li>
<li>If upgrading is not immediately feasible, disable S3 Select access via IAM policies, specifically denying <code>s3:GetObject</code> actions or <code>SelectObjectContent</code> requests as described in the &ldquo;Workarounds&rdquo; section of the advisory.</li>
<li>Monitor MinIO server resource consumption, particularly memory usage, to detect potential exploitation attempts. Deploy the provided Sigma rule to detect potential DoS attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>dos</category><category>minio</category><category>s3select</category></item></channel></rss>