{"id":"CVE-2021-39231","details":"In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.","aliases":["GHSA-3w5h-x4rh-hc28"],"modified":"2026-04-12T01:58:12.094488Z","published":"2021-11-19T10:15:08.110Z","references":[{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2021/11/19/2"},{"type":"ADVISORY","url":"https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C110cd117-75ed-364b-cd38-3effd20f2183%40apache.org%3E"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/ozone","events":[{"introduced":"0"},{"fixed":"9ee6f1872dca8469057d3c7bf880931c0e7b7f3e"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"1.2.0"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:apache:ozone:*:*:*:*:*:*:*:*"}}],"versions":["ozone-1.2.0-RC0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-39231.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"}]}