First published: Fri Nov 19 2021(Updated: )
In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Ozone | <1.2.0 | |
<1.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-41532 is a vulnerability in Apache Ozone before version 1.2.0 that allows unauthenticated users to access OM, SCM, and Datanode metadata through Recon HTTP endpoints.
CVE-2021-41532 has a severity rating of 5.3 (Medium).
CVE-2021-41532 affects Apache Ozone version up to exclusive 1.2.0.
The CWE ID for CVE-2021-41532 is 200.
Yes, you can find references for CVE-2021-41532 at the following links: [link1](http://www.openwall.com/lists/oss-security/2021/11/19/8) and [link2](https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3Ce0bc6598-9669-b897-fc28-de8a896e36aa%40apache.org%3E).