Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <dfb97456-33c7-be39-5288-c341a34fef0a@apache.org>
Date: Wed, 07 Feb 2024 12:49:17 +0000
From: István Fajth <pifta@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2023-39196: Apache Ozone: Missing mutual TLS authentication in
 one of the service internal Ozone Storage Container Manager endpoints 

Severity: moderate

Affected versions:

- Apache Ozone 1.2.0 through 1.3.0

Description:

Improper Authentication vulnerability in Apache Ozone.

The vulnerability allows an attacker to download metadata internal to the Storage Container Manager service without proper authentication.
The attacker is not allowed to do any modification within the Ozone Storage Container Manager service using this vulnerability.
The accessible metadata does not contain sensitive information that can be used to exploit the system later on, and the accessible data does not make it possible to gain access to actual user data within Ozone.
This issue affects Apache Ozone: 1.2.0 and subsequent releases up until 1.3.0.

Users are recommended to upgrade to version 1.4.0, which fixes the issue.

References:

https://ozone.apache.org
https://www.cve.org/CVERecord?id=CVE-2023-39196

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.