关联漏洞
标题:
MinIO 信息泄露漏洞
(CVE-2023-28432)
描述:MinIO是美国MinIO公司的一款开源的对象存储服务器。该产品支持构建用于机器学习、分析和应用程序数据工作负载的基础架构。 MinIO 存在信息泄露漏洞,该漏洞源于在集群部署中MinIO会返回所有环境变量,导致信息泄露。
描述
MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)
介绍
# CVE-2023-28432
## MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)
**Chinese name: MinIO verify 接口敏感信息泄露漏洞(CVE-2023-28432)**
**Description** : MinIO is an open source object storage service that is compatible with the Amazon S3 API and can be used in private or public clouds. MinIO is a high-performance, high-availability distributed storage system that can store large amounts of data and provide high-speed read and write capabilities for data. MinIO adopts a distributed architecture and can run on multiple nodes to realize distributed storage and processing of data.
**Impact** : There is a sensitive information disclosure vulnerability in the MiniO verify interface, which allows attackers to read sensitive system information by constructing special URL addresses.</span>

**[Goby Official URL: https://gobies.org/](https://gobies.org/)**
If you have a functional type of issue, you can raise an issue on GitHub or in the discussion group below:
1. GitHub issue: https://github.com/gobysec/Goby/issues
2. Telegram Group: http://t.me/gobies (Group benefits: enjoy the version update 1 month in advance)
3. Telegram Channel: https://t.me/joinchat/ENkApMqOonRhZjFl (Channel benefits: enjoy the version update 1 month in advance)
4. WeChat Group: First add my personal WeChat: **gobyteam**, I will add everyone to the official WeChat group of Goby. (Group benefits: enjoy the version update 1 month in advance)
文件快照
[4.0K] /data/pocs/704d7e455c8d4c2f97a0b7e828048c97c2e2239b
└── [1.5K] README.md
0 directories, 1 file
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。