|
Cpe Name: cpe:2.3:a:apache:ozone:*:*:*:*:*:*:*:*
# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2021-41532 |
668 |
|
|
2021-11-19 |
2021-11-19 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints. |
2 |
CVE-2021-39236 |
287 |
|
|
2021-11-19 |
2021-11-19 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user. |
3 |
CVE-2021-39235 |
732 |
|
|
2021-11-19 |
2021-11-19 |
4.0 |
None |
Remote |
Low |
??? |
None |
Partial |
None |
In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block. |
4 |
CVE-2021-39234 |
863 |
|
Bypass |
2021-11-19 |
2021-11-19 |
4.9 |
None |
Remote |
Medium |
??? |
Partial |
Partial |
None |
In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL. |
5 |
CVE-2021-39233 |
863 |
|
|
2021-11-19 |
2021-11-19 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client. |
6 |
CVE-2021-39232 |
863 |
|
Exec Code |
2021-11-19 |
2021-11-19 |
6.5 |
None |
Remote |
Low |
??? |
Partial |
Partial |
Partial |
In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins. |
7 |
CVE-2021-39231 |
668 |
|
|
2021-11-19 |
2021-11-20 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration. |
8 |
CVE-2021-36372 |
273 |
|
|
2021-11-19 |
2021-11-20 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked. |
Total number of vulnerabilities : 8
Page :
1
(This Page)
|
|
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is
MITRE's CVE web site.
CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is
MITRE's CWE web site.
OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is
MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition.
There are NO warranties, implied or otherwise, with regard to this information or its use.
Any use of this information is at the user's risk.
It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content.
EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site.
ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT,
INDIRECT or any other kind of loss.