Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN655
_____________________________________________________________________

DATE                : 30/09/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running MinIO Java versions prior to
                                       8.6.0.

=====================================================================
https://github.com/minio/minio-java/security/advisories/GHSA-h7rh-xfpj-hpcm
_____________________________________________________________________


MinIO Java Client XML Tag Value Substitution Vulnerability
High
harshavardhana published GHSA-h7rh-xfpj-hpcm Sep 29, 2025

Package
io.minio.minio (Maven)

Affected versions
< 8.6.0

Patched versions
8.6.0


Description

Description

In minio-java versions prior to 8.6.0, XML tag values containing
references to system properties or environment variables were
automatically substituted with their actual values during
processing. This unintended behavior could lead to the exposure
of sensitive information, including credentials, file paths, or
system configuration details, if such references were present
in XML content from untrusted sources.


Affected Versions

    minio-java < 8.6.0

All applications utilizing affected versions of minio-java for
parsing XML with potentially untrusted input are vulnerable.


Impact

This vulnerability poses a high risk of information disclosure.
Attackers could craft malicious XML inputs to extract sensitive
data from the system's properties or environment variables,
potentially compromising security in applications relying on
minio-java for object storage operations.


Patches

The issue is resolved in minio-java version 8.6.0 and later.
In these versions, automatic substitution of XML tag values
with system properties or environment variables has been
disabled.

Users are strongly advised to upgrade to minio-java 8.6.0 or
a newer release to mitigate the vulnerability.


Workarounds

No full workarounds exist without upgrading the library. As
interim measures:

    Refrain from processing XML data from untrusted or
external sources.
    Implement input sanitization or validation to detect and
remove references to
    system properties or environment variables in XML content.


References

    minio-java Release Notes for 8.6.0


Severity
High

CVE ID
CVE-2025-59952

Weaknesses
No CWEs

Credits

    @Tanguy-Boisset Tanguy-Boisset Reporter
    @pyguerder pyguerder Reporter


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
