|
Message-ID: <b6f98381-1069-fe31-7cde-fca6a50b0740@apache.org> Date: Mon, 02 Dec 2024 15:57:47 +0000 From: Ethan Rose <erose@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-45106: Apache Ozone: Improper authentication when generating S3 secrets Severity: moderate Affected versions: - Apache Ozone 1.4.0 Description: Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if: * ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false. * The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators. Users are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint. This issue is being tracked as HDDS-9203 Credit: Ethan Rose (reporter) Ivan Zlenko (remediation developer) References: https://ozone.apache.org https://www.cve.org/CVERecord?id=CVE-2024-45106 https://issues.apache.org/jira/browse/HDDS-9203
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.