CVE-2021-39231 is a vulnerability in Apache Ozone
Published on November 19, 2021
Missing authentication/authorization on internal RPC endpoints
In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
Weakness Type
What is an AuthZ Vulnerability?
The software does not perform an authorization check when an actor attempts to access a resource or perform an action.
CVE-2021-39231 has been classified to as an AuthZ vulnerability or weakness.
Products Associated with CVE-2021-39231
Want to know whenever a new CVE is published for Apache Ozone? stack.watch will email you.
Affected Versions
Apache Software Foundation Apache Ozone:- Version 1.0, <= 1.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.