First published: Fri Nov 19 2021(Updated: )
In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Ozone | <1.2.0 | |
maven/org.apache.ozone:ozone-main | <1.2.0 | 1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-39231 is a vulnerability in Apache Ozone that allows an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
CVE-2021-39231 has a severity rating of 9.1 (critical).
Apache Ozone versions prior to 1.2.0 are affected by CVE-2021-39231.
To fix CVE-2021-39231, update to Apache Ozone version 1.2.0 or later.
You can find more information about CVE-2021-39231 on the following references: [Openwall](http://www.openwall.com/lists/oss-security/2021/11/19/2), [Apache Ozone Mailing List](https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C110cd117-75ed-364b-cd38-3effd20f2183%40apache.org%3E), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2021-39231).