Description
In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
No analysis available yet.
Remediation
Vendor Workaround
Upgrade to Apache Ozone release version 1.2.0
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3w5h-x4rh-hc28 | Exposure of sensitive information in Apache Ozone |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T01:58:18.341Z
Reserved: 2021-08-17T00:00:00.000Z
Link: CVE-2021-39231
No data.
Status : Modified
Published: 2021-11-19T10:15:08.110
Modified: 2024-11-21T06:18:58.047
Link: CVE-2021-39231
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA