Missing authentication/authorization on internal RPC endpoints
CVE-2021-39231

9.1CRITICAL

Key Information:

Vendor
Apache
Vendor
CVE Published:
19 November 2021

Summary

In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.

Affected Version(s)

Apache Ozone 1.0

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Apache Ozone would like to thank Marton Elek for reporting this issue.
.