CVE-2025-62506 (CNNVD-202510-2281)

HIGH
中文标题:
MinIO 安全漏洞
英文标题:
MinIO vulnerable to privilege escalation via session policy bypass in service accounts and STS
CVSS分数: 8.1
发布时间: 2025-10-16 21:17:28
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

MinIO是美国MinIO公司的一款开源的对象存储服务器。该产品支持构建用于机器学习、分析和应用程序数据工作负载的基础架构。 MinIO 2025-10-15T17-29-55Z之前版本存在安全漏洞,该漏洞源于IAM策略验证逻辑错误,可能导致权限提升。

英文描述:

MinIO is a high-performance object storage system. In all versions prior to RELEASE.2025-10-15T17-29-55Z, a privilege escalation vulnerability allows service accounts and STS (Security Token Service) accounts with restricted session policies to bypass their inline policy restrictions when performing operations on their own account, specifically when creating new service accounts for the same user. The vulnerability exists in the IAM policy validation logic where the code incorrectly relied on the DenyOnly argument when validating session policies for restricted accounts. When a session policy is present, the system should validate that the action is allowed by the session policy, not just that it is not denied. An attacker with valid credentials for a restricted service or STS account can create a new service account for itself without policy restrictions, resulting in a new service account with full parent privileges instead of being restricted by the inline policy. This allows the attacker to access buckets and objects beyond their intended restrictions and modify, delete, or create objects outside their authorized scope. The vulnerability is fixed in version RELEASE.2025-10-15T17-29-55Z.

CWE类型:
CWE-863
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
minio minio < RELEASE.2025-10-15T17-29-55Z - - cpe:2.3:a:minio:minio:<_release.2025-10-15t17-29-55z:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
https://github.com/minio/minio/security/advisories/GHSA-jjjj-jwhf-8rgr x_refsource_CONFIRM
cve.org
访问
https://github.com/minio/minio/pull/21642 x_refsource_MISC
cve.org
访问
https://github.com/minio/minio/commit/c1a49490c78e9c3ebcad86ba0662319138ace190 x_refsource_MISC
cve.org
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
CVSS评分详情
3.1 (cna)
HIGH
8.1
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
机密性
HIGH
完整性
HIGH
可用性
NONE
时间信息
发布时间:
2025-10-16 21:17:28
修改时间:
2025-10-23 19:03:46
创建时间:
2025-11-11 15:40:49
更新时间:
2025-11-11 16:00:17
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2025-62506 2025-11-11 15:23:33 2025-11-11 07:40:49
NVD nvd_CVE-2025-62506 2025-11-11 15:01:06 2025-11-11 07:48:35
CNNVD cnnvd_CNNVD-202510-2281 2025-11-11 15:12:59 2025-11-11 08:00:17
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 16:00:17
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202510-2281; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202510-2281
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:48:35
references_count: 3 → 6; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • references_count: 3 -> 6
  • data_sources: ['cve'] -> ['cve', 'nvd']