CVE-2021-36372

In Apache Ozone versions prior to 1.2.0, Initially generated block tokens are persisted to the metadata database and can be retrieved with authenticated users with permission to the key. Authenticated users may use them even after access is revoked.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:ozone:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:13

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2021/11/19/1 - Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/11/19/1 - Third Party Advisory
References () https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C5029c1ac-4685-8492-e3cb-ab48c5c370cf%40apache.org%3E - Mailing List, Mitigation, Vendor Advisory () https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C5029c1ac-4685-8492-e3cb-ab48c5c370cf%40apache.org%3E - Mailing List, Mitigation, Vendor Advisory

Information

Published : 2021-11-19 10:15

Updated : 2024-11-21 06:13


NVD link : CVE-2021-36372

Mitre link : CVE-2021-36372

CVE.ORG link : CVE-2021-36372


JSON object : View

Products Affected

apache

  • ozone
CWE
CWE-273

Improper Check for Dropped Privileges