|
Message-ID: <dfb97456-33c7-be39-5288-c341a34fef0a@apache.org> Date: Wed, 07 Feb 2024 12:49:17 +0000 From: István Fajth <pifta@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2023-39196: Apache Ozone: Missing mutual TLS authentication in one of the service internal Ozone Storage Container Manager endpoints Severity: moderate Affected versions: - Apache Ozone 1.2.0 through 1.3.0 Description: Improper Authentication vulnerability in Apache Ozone. The vulnerability allows an attacker to download metadata internal to the Storage Container Manager service without proper authentication. The attacker is not allowed to do any modification within the Ozone Storage Container Manager service using this vulnerability. The accessible metadata does not contain sensitive information that can be used to exploit the system later on, and the accessible data does not make it possible to gain access to actual user data within Ozone. This issue affects Apache Ozone: 1.2.0 and subsequent releases up until 1.3.0. Users are recommended to upgrade to version 1.4.0, which fixes the issue. References: https://ozone.apache.org https://www.cve.org/CVERecord?id=CVE-2023-39196
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.