In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
{ "nvd_published_at": "2021-11-19T10:15:00Z", "cwe_ids": [ "CWE-668", "CWE-862" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2021-11-22T18:38:38Z" }