Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-1224

NIXPKGS-2026-1224
published on
updated 6 days, 12 hours ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    37 packages
    • minion
    • kminion
    • minio-cpp
    • minio-warp
    • minio-client
    • minio-certgen
    • minio_legacy_fs
    • perlPackages.Minion
    • perl5Packages.Minion
    • haskellPackages.minion
    • perl538Packages.Minion
    • perl540Packages.Minion
    • python312Packages.minio
    • python313Packages.minio
    • python314Packages.minio
    • haskellPackages.minio-hs
    • terraform-providers.minio
    • haskellPackages.minion-jwt
    • haskellPackages.minion-htmx
    • haskellPackages.minion-conduit
    • haskellPackages.minion-openapi3
    • perlPackages.MinionBackendRedis
    • perlPackages.MinionBackendmysql
    • haskellPackages.minion-wai-extra
    • perl5Packages.MinionBackendRedis
    • perl5Packages.MinionBackendmysql
    • perlPackages.MinionBackendSQLite
    • perl5Packages.MinionBackendSQLite
    • perl538Packages.MinionBackendRedis
    • perl538Packages.MinionBackendmysql
    • perl540Packages.MinionBackendRedis
    • perl540Packages.MinionBackendmysql
    • terraform-providers.aminueza_minio
    • perl538Packages.MinionBackendSQLite
    • perl540Packages.MinionBackendSQLite
    • home-assistant-component-tests.minio
    • tests.home-assistant-components.minio
  • @LeSuisse ignored
    2 maintainers
    • @bachp
    • @ryan4yin
    maintainer.ignore
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
MinIO has an Unauthenticated Object Write via Query-String Credential Signature Bypass in Unsigned-Trailer Uploads

MinIO is a high-performance object storage system. Starting in RELEASE.2023-05-18T00-05-36Z and prior to RELEASE.2026-04-11T03-20-12Z, an authentication bypass vulnerability in MinIO's `STREAMING-UNSIGNED-PAYLOAD-TRAILER` code path allows any user who knows a valid access key to write arbitrary objects to any bucket without knowing the secret key or providing a valid cryptographic signature. Any MinIO deployment is impacted. The attack requires only a valid access key (the well-known default `minioadmin`, or any key with WRITE permission on a bucket) and a target bucket name. `PutObjectHandler` and `PutObjectPartHandler` call `newUnsignedV4ChunkedReader` with a signature verification gate based solely on the presence of the `Authorization` header. Meanwhile, `isPutActionAllowed` extracts credentials from either the `Authorization` header or the `X-Amz-Credential` query parameter, and trusts whichever it finds. An attacker omits the `Authorization` header and supplies credentials exclusively via the query string. The signature gate evaluates to `false`, `doesSignatureMatch` is never called, and the request proceeds with the permissions of the impersonated access key. This affects `PutObjectHandler` (standard and tables/warehouse bucket paths) and `PutObjectPartHandler` (multipart uploads). Users of the open-source `minio/minio` project should upgrade to MinIO AIStor `RELEASE.2026-04-11T03-20-12Z` or later. If upgrading is not immediately possible, block unsigned-trailer requests at the load balancer. Reject any request containing `X-Amz-Content-Sha256: STREAMING-UNSIGNED-PAYLOAD-TRAILER` at the reverse proxy or WAF layer. Clients can use `STREAMING-AWS4-HMAC-SHA256-PAYLOAD-TRAILER` (the signed variant) instead. Alternatively, restrict WRITE permissions. Limit `s3:PutObject` grants to trusted principals. While this reduces the attack surface, it does not eliminate the vulnerability since any user with WRITE permission can exploit it with only their access key.

Affected products

minio
  • ==>= RELEASE.2023-05-18T00-05-36Z, < RELEASE.2026-04-11T03-20-12Z

Matching in nixpkgs

Ignored packages (37)

pkgs.minion

Addon manager for World of Warcraft and The Elder Scrolls Online

pkgs.kminion

Feature-rich Prometheus exporter for Apache Kafka written in Go

pkgs.minio-cpp

MinIO C++ Client SDK for Amazon S3 Compatible Cloud Storage

pkgs.minio-certgen

Simple Minio tool to generate self-signed certificates, and provides SAN certificates with DNS and IP entries

Package maintainers

Ignored maintainers (2)