Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CABK_9Y-q9o4T33KCOQ-p1bi5DUu8EyujZtU2g7qvG3WjXeKc6A@mail.gmail.com>
Date: Tue, 27 Apr 2021 09:26:59 +0530
From: Bharat Viswanadham <bharat@...che.org>
To: users@...ne.apache.org
Cc: oss-security@...ts.openwall.com
Subject: CVE-2020-17517: Apache Ozone: Ozone S3 Gateway allows bucket and key
 access to non authenticated users

Description:

The S3 buckets and keys in a secure Apache Ozone Cluster must be
inaccessible to anonymous access by default. The current security
vulnerability allows access to keys and buckets through a curl command
or an unauthenticated HTTP request. This enables unauthorized access
to buckets and keys thereby exposing data to anonymous clients or
users.  This affected Apache Ozone prior to the 1.1.0 release.

Mitigation:

Upgrade to the latest Apache Ozone 1.1.0 release.

Credit:

Apache Ozone would like to thank Kota Uenishi for reporting this issue.


Thanks,

Apache Ozone Team.

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.