Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <b6f98381-1069-fe31-7cde-fca6a50b0740@apache.org>
Date: Mon, 02 Dec 2024 15:57:47 +0000
From: Ethan Rose <erose@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-45106: Apache Ozone: Improper authentication when
 generating S3 secrets 

Severity: moderate

Affected versions:

- Apache Ozone 1.4.0

Description:

Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if:
  *  ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false.
  *  The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators.


Users are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint.

This issue is being tracked as HDDS-9203 

Credit:

Ethan Rose (reporter)
Ivan Zlenko (remediation developer)

References:

https://ozone.apache.org
https://www.cve.org/CVERecord?id=CVE-2024-45106
https://issues.apache.org/jira/browse/HDDS-9203

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.