In Apache Ozone versions prior to 1.2.0, Various internal server-to-server RPC endpoints are available for connections, making it possible for an attacker to download raw data from Datanode and Ozone manager and modify Ratis replication configuration.
{
"severity": "CRITICAL",
"github_reviewed": true,
"github_reviewed_at": "2021-11-22T18:38:38Z",
"cwe_ids": [
"CWE-668",
"CWE-862"
],
"nvd_published_at": "2021-11-19T10:15:00Z"
}