-
Notifications
You must be signed in to change notification settings - Fork 65
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
x/vulndb: potential Go vuln in github.com/minio/minio: CVE-2022-24842 #421
Labels
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
Comments
Vulnerability in tool. |
This was referenced Nov 8, 2023
Change https://go.dev/cl/592767 mentions this issue: |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
excluded: EFFECTIVELY_PRIVATE
This vulnerability exists in a package can be imported, but isn't meant to be outside that module.
CVE-2022-24842 references github.com/minio/minio, which may be a Go module.
Description:
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. A security issue was found where an non-admin user is able to create service accounts for root or other admin users and then is able to assume their access policies via the generated credentials. This in turn allows the user to escalate privilege to that of the root user. This vulnerability has been resolved in pull request #14729 and is included in
RELEASE.2022-04-12T06-55-35Z
. Users unable to upgrade may workaround this issue by explicitly adding aadmin:CreateServiceAccount
deny policy, however, this, in turn, denies the user the ability to create their own service accounts as well.Links:
See doc/triage.md for instructions on how to triage this report.
The text was updated successfully, but these errors were encountered: