Intelligence
criticalVulnerabilityActive

JWT Algorithm Confusion in MinIO OIDC Authentication - Defensive Analysis

MinIO's OIDC implementation contains a JWT algorithm confusion vulnerability allowing attackers who possess the ClientSecret to forge identity tokens and obtain admin-level S3 credentials. This PoC demonstrates a deterministic, high-impact attack path requiring only knowledge of a shared credential.

S
Sebastion

CVE References

Affected

MinIO/minio (RELEASE.2022-11-08T05-27-07Z through final OSS release)

Vulnerability Description

This is a JWT algorithm confusion vulnerability in MinIO's OpenID Connect (OIDC) authentication handler. The root cause stems from improper validation of the JWT signing algorithm during token verification. When MinIO validates OIDC identity tokens, it fails to enforce strict algorithm checking, allowing an attacker to manipulate the algorithm parameter (typically from RS256 to HS256) and sign forged tokens using the shared OIDC ClientSecret instead of the provider's private key. The impact is severe: successful exploitation enables complete authentication bypass, arbitrary user impersonation, and privilege escalation to consoleAdmin role, granting unrestricted access to all S3 data and MinIO console operations.

Proof-of-Concept Significance

This PoC is highly significant for defensive assessment because: (1) it demonstrates a deterministic, 100% reliable attack with no timing windows or race conditions; (2) it requires only the OIDC ClientSecret—a shared credential more widely accessible than assumed (exposed in previous CVE-2023-28432, embedded in configurations, mobile apps, CI/CD); (3) it reliably produces forged tokens that bypass all downstream authentication checks. The precondition of ClientSecret knowledge is realistic across multiple attack scenarios (supply chain compromise, insider threat, accidental exposure).

Detection Guidance

Log Indicators:

  • Successful OIDC authentication events immediately followed by consoleAdmin policy attachment for newly seen or unexpected user identities
  • OIDC token validation logs showing HS256 algorithm selection when RS256 is configured
  • Multiple failed authentication attempts followed by successful login with elevated privileges from the same source IP
  • S3 audit logs showing consoleAdmin actions attributed to users that do not typically hold admin roles

Configuration Baselines:

  • Monitor for OIDC configurations where algorithm enforcement is disabled or permissive
  • Alert on presence of ClientSecret in frontend accessible locations, container images, or version control

Mitigation Steps

  1. Immediate: Upgrade to MinIO AIStor RELEASE.2026-03-17T21-25-16Z or later
  2. Interim Workarounds (if patching delayed): Disable OIDC authentication if not mission-critical; rotate and restrict OIDC ClientSecret access; implement network-level access controls limiting who can reach MinIO endpoints; enable verbose logging of all OIDC authentication events
  3. Configuration Hardening: Enforce strict JWT algorithm validation in authentication handlers; audit all users/roles with consoleAdmin privileges; revoke unnecessary admin role assignments; implement certificate pinning for OIDC provider communication
  4. Forensics: Audit auth logs for token forgery patterns; review S3 access logs for unauthorized changes during vulnerability window; rotate all S3 credentials issued during affected period

Risk Assessment

Likelihood of Wild Exploitation: HIGH

  • Algorithm confusion vulnerabilities are well-understood attack class with established tooling (jwt-cli, jwt.io)
  • ClientSecret exposure vector (CVE-2023-28432, config management) is proven and recurring
  • Deterministic nature (100% success) makes this highly attractive to threat actors
  • MinIO is widely deployed in cloud-native, Kubernetes, and data lake environments where compromise has high business impact

Threat Actor Interest: CRITICAL

  • Ransomware operators targeting object storage for data exfiltration
  • APT groups conducting lateral movement in cloud infrastructure
  • Insider threats with infrastructure access but no direct admin credentials