Apache Software Foundation Apache Ozone vulnerabilities

11 known vulnerabilities affecting apache_software_foundation/apache_ozone.

Total CVEs
11
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH4MEDIUM4

Vulnerabilities

Page 1 of 1
CVE-2024-45106HIGHCVSS 8.1v1.4.02024-12-03
CVE-2024-45106 [HIGH] CWE-287 CVE-2024-45106: Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authe Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if: * ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false. * The user configured in ozone.s3g.kerberos.pri
cvelistv5nvd
CVE-2023-39196MEDIUMCVSS 5.3≥ 1.2.0, ≤ 1.3.02024-02-07
CVE-2023-39196 [MEDIUM] CWE-287 CVE-2023-39196: Improper Authentication vulnerability in Apache Ozone. The vulnerability allows an attacker to down Improper Authentication vulnerability in Apache Ozone. The vulnerability allows an attacker to download metadata internal to the Storage Container Manager service without proper authentication. The attacker is not allowed to do any modification within the Ozone Storage Container Manager service using this vulnerability. The accessible metadata does
cvelistv5nvd
CVE-2021-36372CRITICALCVSS 9.8≥ 1.1, ≤ 1.12021-11-19
CVE-2021-36372 [CRITICAL] CWE-273 CVE-2021-36372: In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metad In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.
cvelistv5nvd
CVE-2021-39231CRITICALCVSS 9.1≥ 1.0, ≤ 1.02021-11-19
CVE-2021-39231 [CRITICAL] CWE-862 CVE-2021-39231: In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are availab In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
cvelistv5nvd
CVE-2021-39233CRITICALCVSS 9.1≥ 1.1, ≤ 1.12021-11-19
CVE-2021-39233 [CRITICAL] CWE-306 CVE-2021-39233: In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.
cvelistv5nvd
CVE-2021-39236HIGHCVSS 8.8≥ 1.0, ≤ 1.02021-11-19
CVE-2021-39236 [HIGH] CWE-862 CVE-2021-39236: In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specifi In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.
cvelistv5nvd
CVE-2021-39232HIGHCVSS 8.8≥ 1.0, ≤ 1.02021-11-19
CVE-2021-39232 [HIGH] CWE-862 CVE-2021-39232: In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any a In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.
cvelistv5nvd
CVE-2021-41532MEDIUMCVSS 5.3≥ Everglades (1.1.0), ≤ 1.1.02021-11-19
CVE-2021-41532 [MEDIUM] CWE-200 CVE-2021-41532: In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.
cvelistv5nvd
CVE-2021-39235MEDIUMCVSS 6.5≥ 1.0, ≤ 1.02021-11-19
CVE-2021-39235 [MEDIUM] CWE-732 CVE-2021-39235: In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block to In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.
cvelistv5nvd
CVE-2021-39234MEDIUMCVSS 6.8≥ 1.1, ≤ 1.12021-11-19
CVE-2021-39234 [MEDIUM] CWE-20 CVE-2021-39234: In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.
cvelistv5nvd
CVE-2020-17517HIGHCVSS 7.5≥ Apache Ozone, ≤ 1.0.02021-04-27
CVE-2020-17517 [HIGH] CWE-285 CVE-2020-17517: The S3 buckets and keys in a secure Apache Ozone Cluster must be inaccessible to anonymous access by The S3 buckets and keys in a secure Apache Ozone Cluster must be inaccessible to anonymous access by default. The current security vulnerability allows access to keys and buckets through a curl command or an unauthenticated HTTP request. This enables unauthorized access to buckets and keys thereby exposing data to anonymous clients or users. This affe
cvelistv5nvd