-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Open
Milestone
Description
problem
When account A deletes MinIO bucket from CloudStack web UI, MinIO policy for special MinIO user access to this bucket remains intact. If (when) account B creates bucket with the same name, account A may get access to it using saved Access+Secret Keys and any S3 utility.
Remediation: delete MinIO policy providing access to specific bucket on bucket deletion.
versions
CloudStack v 4.22
The steps to reproduce the bug
- Login to web UI as user/account A
- Create S3 bucket 'test'
- Save access credentials (Access Key, Secret Key, URL without final bucket path)
- Delete bucket 'test'
- Login to web UI as user/account B
- Create S3 bucket 'test'
- Using bucket browser, upload some file to bucket
- Create mc alias for user A as 'mc alias set userA-test $URL $Access_Key $Secret_Key'
- Check bucket contents 'mc ls userA-test/test'
...
What to do about it?
Modify code to delete access policy on bucket deleteion
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels