|
Message-ID: <CABK_9Y-q9o4T33KCOQ-p1bi5DUu8EyujZtU2g7qvG3WjXeKc6A@mail.gmail.com> Date: Tue, 27 Apr 2021 09:26:59 +0530 From: Bharat Viswanadham <bharat@...che.org> To: users@...ne.apache.org Cc: oss-security@...ts.openwall.com Subject: CVE-2020-17517: Apache Ozone: Ozone S3 Gateway allows bucket and key access to non authenticated users Description: The S3 buckets and keys in a secure Apache Ozone Cluster must be inaccessible to anonymous access by default. The current security vulnerability allows access to keys and buckets through a curl command or an unauthenticated HTTP request. This enables unauthorized access to buckets and keys thereby exposing data to anonymous clients or users. This affected Apache Ozone prior to the 1.1.0 release. Mitigation: Upgrade to the latest Apache Ozone 1.1.0 release. Credit: Apache Ozone would like to thank Kota Uenishi for reporting this issue. Thanks, Apache Ozone Team.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.