| Title | minio <=RELEASE.2025-10-15T17-29-55Z Improper Restriction of Excessive Authentication Attempts |
|---|
| Description | MinIO's STS (Security Token Service) LDAP authentication endpoint (AssumeRoleWithLDAPIdentity) contains two vulnerabilities that, when combined, allow unauthenticated attackers to compromise LDAP user accounts:
User Enumeration: Distinct error messages reveal whether a username exists
No Rate Limiting: Unlimited authentication attempts without throttling or lockout
Successful exploitation grants attackers temporary AWS-style credentials (AccessKeyId/SecretAccessKey/SessionToken) with full access to the victim's S3 buckets. |
|---|
| Source | ⚠️ https://github.com/zast-ai/vulnerability-reports/blob/main/minio/Ldap_BruteForce.md |
|---|
| User | ZAST.AI (UID 87884) |
|---|
| Submission | 03/13/2026 05:41 (19 days ago) |
|---|
| Moderation | 03/24/2026 07:52 (11 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 352698 [MinIO up to 0.0.0-20260212201848-7aac2a2c5b7c Security Token Service AccessKeyId/SecretAccessKey/SessionToken information exposure] |
|---|
| Points | 20 |
|---|