In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3w5h-x4rh-hc28 | Exposure of sensitive information in Apache Ozone |
Fixes
Solution
No solution given by the vendor.
Workaround
Upgrade to Apache Ozone release version 1.2.0
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T01:58:18.341Z
Reserved: 2021-08-17T00:00:00.000Z
Link: CVE-2021-39231
No data.
Status : Modified
Published: 2021-11-19T10:15:08.110
Modified: 2024-11-21T06:18:58.047
Link: CVE-2021-39231
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA