The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-21287

CVE-2021-21287: MinIO Object Storage SSRF Vulnerability

CVE-2021-21287 is a server-side request forgery flaw in MinIO Object Storage that allows attackers to abuse server functionality to access internal resources. This article covers technical details, affected versions, and mitigation.

Published: February 25, 2026

CVE-2021-21287 Overview

CVE-2021-21287 is a Server-Side Request Forgery (SSRF) vulnerability affecting MinIO, a High Performance Object Storage solution released under Apache License v2.0. In MinIO versions prior to RELEASE.2021-01-30T00-20-58Z, an attacker can exploit functionality for importing data from URLs, publishing data to URLs, or reading data from URLs that can be tampered with.

The attacker can modify calls to this functionality by supplying a completely different URL or by manipulating how URLs are built through path traversal techniques. This allows the attacker to abuse server functionality to read or update internal resources, potentially accessing sensitive server configuration such as AWS metadata, connecting to internal services like HTTP-enabled databases, or performing POST requests towards internal services not intended to be exposed.

Critical Impact

Authenticated attackers can exploit this SSRF vulnerability from the network to read sensitive internal resources including AWS metadata, access internal HTTP-enabled databases, and interact with unexposed internal services, leading to significant confidentiality breaches.

Affected Products

  • MinIO versions prior to RELEASE.2021-01-30T00-20-58Z
  • MinIO Object Storage with browser front-end enabled
  • MinIO deployments with URL import/export functionality exposed

Discovery Timeline

  • 2021-02-01 - CVE-2021-21287 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-21287

Vulnerability Analysis

This SSRF vulnerability exists in MinIO's URL handling functionality within the web handlers component. The vulnerability is classified under CWE-918 (Server-Side Request Forgery), indicating that the application accepts user-controlled URLs without proper validation, allowing attackers to craft requests that the server will execute on their behalf.

The attack requires low privileges (authenticated access) and can be executed remotely over the network with no user interaction required. What makes this vulnerability particularly dangerous is its ability to affect resources beyond the vulnerable component's security scope, enabling attackers to reach internal network resources that would otherwise be inaccessible.

Root Cause

The root cause lies in insufficient validation and sanitization of user-supplied URLs in the cmd/web-handlers.go component. The LoginSTS functionality was implemented in a manner that allowed external URL manipulation. The fix involved making LoginSTS an inline implementation to prevent the SSRF attack vector, as well as improving error handling to avoid information disclosure through error messages.

Attack Vector

The attack is network-based and requires an authenticated user to exploit. The attacker can:

  1. Supply a malicious URL to MinIO's data import functionality
  2. Manipulate URL construction through path traversal techniques
  3. Force the server to make requests to internal resources
  4. Exfiltrate sensitive data such as AWS instance metadata (commonly at http://169.254.169.254/)
  5. Interact with internal HTTP services not intended for external access

The security patch addresses this by modifying how STS login is implemented and improving error handling:

go
		default:
			apiErr = APIError{
				Code:           apiErr.Code,
				Description:    fmt.Sprintf("%s: cause(%v)", apiErr.Description, err),
				HTTPStatusCode: apiErr.HTTPStatusCode,
			}
		}
	}

Source: GitHub Commit eb6871e

Detection Methods for CVE-2021-21287

Indicators of Compromise

  • Unusual outbound requests from MinIO servers to internal IP ranges (10.x.x.x, 172.16.x.x, 192.168.x.x)
  • Requests to cloud metadata endpoints such as 169.254.169.254
  • Unexpected URL patterns in MinIO access logs containing internal hostnames or IP addresses
  • Authentication attempts followed by requests to non-standard endpoints

Detection Strategies

  • Monitor MinIO server logs for requests containing internal IP addresses or cloud metadata URLs
  • Implement network-level detection for SSRF patterns using IDS/IPS rules targeting internal IP range requests from web servers
  • Configure web application firewalls to detect and block URL manipulation attempts in MinIO requests
  • Review authentication logs for unusual STS login patterns that may indicate exploitation attempts

Monitoring Recommendations

  • Enable verbose logging on MinIO servers and centralize logs for analysis
  • Implement alerting on requests to RFC1918 private IP ranges and link-local addresses from MinIO instances
  • Monitor for unusual data exfiltration patterns or unexpected network connections from MinIO servers
  • Deploy network segmentation to limit the impact of successful SSRF exploitation

How to Mitigate CVE-2021-21287

Immediate Actions Required

  • Upgrade MinIO to version RELEASE.2021-01-30T00-20-58Z or later immediately
  • If immediate upgrade is not possible, disable the browser front-end using the MINIO_BROWSER=off environment variable
  • Review network segmentation to limit MinIO server access to internal resources
  • Audit recent MinIO logs for any signs of exploitation

Patch Information

MinIO has released a security patch in version RELEASE.2021-01-30T00-20-58Z that addresses this vulnerability. The fix is documented in GitHub Pull Request #11337 and implemented in commit eb6871e. All users are strongly advised to upgrade to this version or later.

Additional resources:

  • MinIO Security Advisory GHSA-m4qq-5f7c-693q
  • MinIO Release Notes

Workarounds

  • Disable the MinIO browser front-end by setting the MINIO_BROWSER=off environment variable if upgrading is not immediately possible
  • Implement strict network egress filtering to prevent the MinIO server from making requests to internal networks
  • Deploy a web application firewall (WAF) configured to detect and block SSRF attack patterns
  • Restrict MinIO server network access using firewall rules to only necessary external endpoints
bash
# Disable MinIO browser front-end as workaround
export MINIO_BROWSER=off

# Restart MinIO service to apply the change
systemctl restart minio

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSSRF

  • Vendor/TechMinio

  • SeverityHIGH

  • CVSS Score7.7

  • EPSS Probability92.00%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-918
  • Technical References
  • GitHub Release Note

  • GitHub Security Advisory
  • Vendor Resources
  • GitHub Commit Update

  • GitHub Pull Request
  • Related CVEs
  • CVE-2026-34204: MinIO Auth Bypass Vulnerability

  • CVE-2026-33419: MinIO AIStor Auth Bypass Vulnerability

  • CVE-2026-33322: MinIO Auth Bypass Vulnerability

  • CVE-2023-28432: Minio Information Disclosure Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English