CVE-2022-31028

MinIO is a multi-cloud object storage solution. Starting with version RELEASE.2019-09-25T18-25-51Z and ending with version RELEASE.2022-06-02T02-11-04Z, MinIO is vulnerable to an unending go-routine buildup while keeping connections established due to HTTP clients not closing the connections. Public-facing MinIO deployments are most affected. Users should upgrade to RELEASE.2022-06-02T02-11-04Z to receive a patch. One possible workaround is to use a reverse proxy to limit the number of connections being attempted in front of MinIO, and actively rejecting connections from such malicious clients.
Configurations

Configuration 1 (hide)

cpe:2.3:a:minio:minio:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:03

Type Values Removed Values Added
References () https://gist.github.com/harshavardhana/2d00e6f909054d2d2524c71485ad02e1 - Exploit, Third Party Advisory () https://gist.github.com/harshavardhana/2d00e6f909054d2d2524c71485ad02e1 - Exploit, Third Party Advisory
References () https://github.com/minio/minio/pull/14995 - Patch, Third Party Advisory () https://github.com/minio/minio/pull/14995 - Patch, Third Party Advisory
References () https://github.com/minio/minio/releases/tag/RELEASE.2022-06-03T01-40-53Z - Third Party Advisory () https://github.com/minio/minio/releases/tag/RELEASE.2022-06-03T01-40-53Z - Third Party Advisory
References () https://github.com/minio/minio/security/advisories/GHSA-qrpr-r3pw-f636 - Third Party Advisory () https://github.com/minio/minio/security/advisories/GHSA-qrpr-r3pw-f636 - Third Party Advisory

Information

Published : 2022-06-07 16:15

Updated : 2024-11-21 07:03


NVD link : CVE-2022-31028

Mitre link : CVE-2022-31028

CVE.ORG link : CVE-2022-31028


JSON object : View

Products Affected

minio

  • minio
CWE
CWE-400

Uncontrolled Resource Consumption