CVE-2021-39235

In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:ozone:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:18

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2021/11/19/6 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2021/11/19/6 - Mailing List, Third Party Advisory
References () https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E - Mailing List, Vendor Advisory () https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E - Mailing List, Vendor Advisory

22 Dec 2023, 19:21

Type Values Removed Values Added
References (MLIST) http://www.openwall.com/lists/oss-security/2021/11/19/6 - Third Party Advisory (MLIST) http://www.openwall.com/lists/oss-security/2021/11/19/6 - Mailing List, Third Party Advisory

Information

Published : 2021-11-19 10:15

Updated : 2024-11-21 06:18


NVD link : CVE-2021-39235

Mitre link : CVE-2021-39235

CVE.ORG link : CVE-2021-39235


JSON object : View

Products Affected

apache

  • ozone
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource