ID CVE-2021-39231
Summary In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:ozone:-:*:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:-:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:0.4.2:alpha-rc0:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:0.4.2:alpha-rc0:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:0.5.0:beta:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:0.5.0:beta:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:0.5.0:beta-rc0:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:0.5.0:beta-rc0:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:0.5.0:beta-rc1:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:0.5.0:beta-rc1:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:0.5.0:beta-rc2:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:0.5.0:beta-rc2:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:1.0.0:-:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:1.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:1.0.0:rc0:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:1.0.0:rc0:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:1.0.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:1.0.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:1.1.0:-:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:1.1.0:-:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:1.1.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:1.1.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:apache:ozone:1.1.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:apache:ozone:1.1.0:rc2:*:*:*:*:*:*
CVSS
Base: 6.4 (as of 21-01-2024 - 02:09)
Impact:
Exploitability:
CWE CWE-862
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:N
Last major update 21-01-2024 - 02:09
Published 19-11-2021 - 10:15
Last modified 21-01-2024 - 02:09
Back to Top