cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-45106,https://securityvulnerability.io/vulnerability/CVE-2024-45106,Improper Authentication in Apache Ozone 1.4.0 Allows Revoking and Regenerating S3 Secrets,"Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if: * ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false. * The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators. Users are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint.",Apache,Apache Ozone,,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-03T09:06:23.356Z,0 CVE-2023-39196,https://securityvulnerability.io/vulnerability/CVE-2023-39196,Improper Authentication Vulnerability in Apache Ozone,"An improper authentication vulnerability exists in the Storage Container Manager of Apache Ozone that permits an attacker to access and download internal metadata without the necessary authentication. Although this issue does not allow any modifications within the Ozone Storage Container Manager service, the accessible metadata does not expose sensitive information or grant access to actual user data. Affected versions include Apache Ozone from 1.2.0 up to 1.3.0. Users are urged to upgrade to version 1.4.0 to mitigate this vulnerability.",Apache,Apache Ozone,5.3,MEDIUM,0.001290000043809414,false,,false,false,false,,,false,false,,2024-02-07T12:56:29.534Z,0 CVE-2021-39231,https://securityvulnerability.io/vulnerability/CVE-2021-39231,Missing authentication/authorization on internal RPC endpoints,"In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.",Apache,Apache Ozone,9.1,CRITICAL,0.0022899999748915434,false,,false,false,false,,,false,false,,2021-11-19T10:15:00.000Z,0 CVE-2021-41532,https://securityvulnerability.io/vulnerability/CVE-2021-41532,Unauthenticated access to Ozone Recon HTTP endpoints,"In Apache Ozone before 1.2.0, Recon HTTP endpoints provide access to OM, SCM and Datanode metadata. Due to a bug, any unauthenticated user can access the data from these endpoints.",Apache,Apache Ozone,5.3,MEDIUM,0.0005499999970197678,false,,false,false,false,,,false,false,,2021-11-19T09:20:26.000Z,0 CVE-2021-39236,https://securityvulnerability.io/vulnerability/CVE-2021-39236,Owners of the S3 tokens are not validated,"In Apache Ozone before 1.2.0, Authenticated users with valid Ozone S3 credentials can create specific OM requests, impersonating any other user.",Apache,Apache Ozone,8.8,HIGH,0.008259999565780163,false,,false,false,false,,,false,false,,2021-11-19T09:20:25.000Z,0 CVE-2021-39235,https://securityvulnerability.io/vulnerability/CVE-2021-39235,Access mode of block tokens are not enforced,"In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.",Apache,Apache Ozone,6.5,MEDIUM,0.0006399999838322401,false,,false,false,false,,,false,false,,2021-11-19T09:20:23.000Z,0 CVE-2021-39234,https://securityvulnerability.io/vulnerability/CVE-2021-39234,Raw block data can be read bypassing ACL/authorization,"In Apache Ozone versions prior to 1.2.0, Authenticated users knowing the ID of an existing block can craft specific request allowing access those blocks, bypassing other security checks like ACL.",Apache,Apache Ozone,6.8,MEDIUM,0.0007399999885819852,false,,false,false,false,,,false,false,,2021-11-19T09:20:22.000Z,0 CVE-2021-39233,https://securityvulnerability.io/vulnerability/CVE-2021-39233,Container-related datanode operations can be called without authorization,"In Apache Ozone versions prior to 1.2.0, Container related Datanode requests of Ozone Datanode were not properly authorized and can be called by any client.",Apache,Apache Ozone,9.1,CRITICAL,0.0033100000582635403,false,,false,false,false,,,false,false,,2021-11-19T09:20:20.000Z,0 CVE-2021-39232,https://securityvulnerability.io/vulnerability/CVE-2021-39232,Missing admin check for SCM related admin commands,"In Apache Ozone versions prior to 1.2.0, certain admin related SCM commands can be executed by any authenticated users, not just by admins.",Apache,Apache Ozone,8.8,HIGH,0.0019099999917671084,false,,false,false,false,,,false,false,,2021-11-19T09:20:19.000Z,0 CVE-2021-36372,https://securityvulnerability.io/vulnerability/CVE-2021-36372,Original block tokens are persisted and can be retrieved,"In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.",Apache,Apache Ozone,9.8,CRITICAL,0.003949999809265137,false,,false,false,false,,,false,false,,2021-11-19T09:20:16.000Z,0 CVE-2020-17517,https://securityvulnerability.io/vulnerability/CVE-2020-17517,"Ozone S3 Gateway allows bucket and key access to non authenticated users ",The S3 buckets and keys in a secure Apache Ozone Cluster must be inaccessible to anonymous access by default. The current security vulnerability allows access to keys and buckets through a curl command or an unauthenticated HTTP request. This enables unauthorized access to buckets and keys thereby exposing data to anonymous clients or users. This affected Apache Ozone prior to the 1.1.0 release.,Apache,Apache Ozone,7.5,HIGH,0.0013800000306218863,false,,false,false,false,,,false,false,,2021-04-27T08:22:22.000Z,0