Skip to content

Authentication bypass issue in the Operator Console

High severity GitHub Reviewed Published Nov 13, 2021 in minio/console • Updated Feb 1, 2023

Package

gomod github.com/minio/console (Go)

Affected versions

< 0.12.3

Patched versions

0.12.3

Description

During an internal security audit, we detected an authentication bypass issue in the Operator Console when an external IDP is enabled. The security issue has been reported internally. We have not observed this exploit in the wild or reported elsewhere in the community at large. All users are advised to upgrade ASAP.

Impact

All users on release v0.12.2 and before are affected.

Patches

This issue was fixed by PR minio/console#1217, users should upgrade to latest release.

Workarounds

Add automountServiceAccountToken: false to the operator-console deployment in Kubernetes so no service account token will get mounted inside the pod, then disable the external identity provider authentication by unset the CONSOLE_IDP_URL, CONSOLE_IDP_CLIENT_ID, CONSOLE_IDP_SECRET and CONSOLE_IDP_CALLBACK environment variable and instead use the Kubernetes service account token.

References

#1217 for more information on the fix and how it was fixed.

For more information

If you have any questions or comments about this advisory:

References

@harshavardhana harshavardhana published to minio/console Nov 13, 2021
Reviewed Nov 15, 2021
Published by the National Vulnerability Database Nov 15, 2021
Published to the GitHub Advisory Database Nov 15, 2021
Last updated Feb 1, 2023

Severity

High

CVSS overall score

This score calculates overall vulnerability severity from 0 to 10 and is based on the Common Vulnerability Scoring System (CVSS).
/ 10

CVSS v3 base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
Low

CVSS v3 base metrics

Attack vector: More severe the more the remote (logically and physically) an attacker can be in order to exploit the vulnerability.
Attack complexity: More severe for the least complex attacks.
Privileges required: More severe if no privileges are required.
User interaction: More severe when no user interaction is required.
Scope: More severe when a scope change occurs, e.g. one vulnerable component impacts resources in components beyond its security scope.
Confidentiality: More severe when loss of data confidentiality is highest, measuring the level of data access available to an unauthorized user.
Integrity: More severe when loss of data integrity is the highest, measuring the consequence of data modification possible by an unauthorized user.
Availability: More severe when the loss of impacted component availability is highest.
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L

EPSS score

28.927%
(97th percentile)

Weaknesses

CVE ID

CVE-2021-41266

GHSA ID

GHSA-4999-659w-mq36

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.