Challenge Information
- Platform: SNHT
- Category: Web
Overview
An outdated MinIO cluster is running with a critical security vulnerability.
Your goal is to retrieve the flag. GLHF!
The IT-Ops Portal is accessible at: http://portal.cfire:8080
Reconnaissance
Upon opening the website we are greeted with IT-ops Portal.

In the channel we get information about an “env var leak” and also that the current version of the cluster is RELEASE.2022-10-24T18-35-07Z.
When clicking the links to the console they both takes you to http://minio.cfire:9001/login login screen.

From the network tab in the console we can find the IP address of the host.

Exploitation
A google search on "minio env var leak" leads to CVE-2023-28432 that affects MinIO deployments with versions starting from RELEASE.2019-12-17T23-16-33Z to RELEASE.2023-03-20T20-16-18Z. This vulnerability exposes environment variables, including MINIO_SECRET_KEY and MINIO_ROOT_PASSWORD.
Here when cluster is started you can browse the web console on http://your-ip:9001 and the API server on http://your-ip:9000.
To get the environment variables you can send a POST request to the endpoint http://your-ip:9000/minio/bootstrap/v1/verify.
Solution
Since the MinIO cluster is within the version range stated in the CVE the plan is to use the CVE to get the environment variables. We then use the credentials, retrieved from the environment variables, to login to the console.
We begin by sending a POST request to the vulnerable endpoint and get the credentials MINIO_ROOT_PASSWORD and MINIO_ROOT_USER.
curl -X POST http://10.42.6.207:9000/minio/bootstrap/v1/verify

Then we use these credentials to login to the console.

Here we can browse through the different directories to find the flag which is located in the documents directory.

Lessons Learned
- Using a CVE to exploit.
- Sending request with curl.
Tools Used
curl