gsd-2021-39235
Vulnerability from gsd
Modified
2023-12-13 01:23
Details
In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2021-39235", "description": "In Apache Ozone before 1.2.0, Ozone Datanode doesn\u0027t check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.", "id": "GSD-2021-39235" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2021-39235" ], "details": "In Apache Ozone before 1.2.0, Ozone Datanode doesn\u0027t check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.", "id": "GSD-2021-39235", "modified": "2023-12-13T01:23:15.766371Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@apache.org", "ID": "CVE-2021-39235", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Apache Ozone", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "1.0", "version_value": "1.0" } ] } } ] }, "vendor_name": "Apache Software Foundation" } ] } }, "credits": [ { "lang": "en", "value": "Apache Ozone would like to thank Marton Elek for reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Apache Ozone before 1.2.0, Ozone Datanode doesn\u0027t check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "cweId": "CWE-732", "lang": "eng", "value": "CWE-732 Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E", "refsource": "MISC", "url": "https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E" }, { "name": "http://www.openwall.com/lists/oss-security/2021/11/19/6", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2021/11/19/6" } ] }, "source": { "defect": [ "HDDS-4558", "HDDS-4644" ], "discovery": "UNKNOWN" }, "work_around": [ { "lang": "en", "value": "Upgrade to Apache Ozone release version 1.2.0" } ] }, "gitlab.com": { "advisories": [ { "affected_range": "(,1.2.0)", "affected_versions": "All versions before 1.2.0", "cvss_v2": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-732", "CWE-937" ], "date": "2021-11-19", "description": "In Apache Ozone, Ozone Datanode does not check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.", "fixed_versions": [ "1.2.0" ], "identifier": "CVE-2021-39235", "identifiers": [ "CVE-2021-39235" ], "not_impacted": "All versions starting from 1.2.0", "package_slug": "maven/org.apache.ozone/ozone-datanode", "pubdate": "2021-11-19", "solution": "Upgrade to version 1.2.0 or above.", "title": "Incorrect Permission Assignment for Critical Resource", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-39235", "https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E", "http://www.openwall.com/lists/oss-security/2021/11/19/6" ], "uuid": "8f717398-d174-4916-abe4-0b124ccd8882" }, { "affected_range": "(,1.2.0)", "affected_versions": "All versions before 1.2.0", "cvss_v2": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "cwe_ids": [ "CWE-1035", "CWE-732", "CWE-937" ], "date": "2021-11-23", "description": "In Apache Ozone before 1.2.0, Ozone Datanode doesn\u0027t check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block.", "fixed_versions": [ "1.2.0" ], "identifier": "CVE-2021-39235", "identifiers": [ "GHSA-c6j7-4fr9-c76p", "CVE-2021-39235" ], "not_impacted": "All versions starting from 1.2.0", "package_slug": "maven/org.apache.ozone/ozone-main", "pubdate": "2021-11-23", "solution": "Upgrade to version 1.2.0 or above.", "title": "Incorrect Permission Assignment for Critical Resource", "urls": [ "https://nvd.nist.gov/vuln/detail/CVE-2021-39235", "https://github.com/advisories/GHSA-c6j7-4fr9-c76p" ], "uuid": "a0db3b68-75a6-4da7-b0fb-61ff3cff5c40" } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:ozone:*:*:*:*:*:*:*:*", "matchCriteriaId": "9DCCB9A0-2922-4ED3-BF73-E84FDDAE7205", "versionEndExcluding": "1.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "In Apache Ozone before 1.2.0, Ozone Datanode doesn\u0027t check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block." }, { "lang": "es", "value": "En Apache Ozone versiones anteriores a 1.2.0, Ozone Datanode no comprueba el par\u00e1metro access mode del token de bloque. Los usuarios autenticados con un token de bloque de lectura v\u00e1lido pueden hacer cualquier operaci\u00f3n de escritura en el mismo bloque" } ], "id": "CVE-2021-39235", "lastModified": "2023-12-22T19:21:34.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-19T10:15:08.303", "references": [ { "source": "security@apache.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2021/11/19/6" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E" } ], "sourceIdentifier": "security@apache.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "security@apache.org", "type": "Secondary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…