← Back to CVEs
CVE-2024-45106
HIGH8.1
Description
Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if: * ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false. * The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators. Users are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint.
CVE Details
CVSS v3.1 Score8.1
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published12/3/2024
Last Modified7/1/2025
Sourcenvd
Honeypot Sightings0
Affected Products
apache:ozone
Weaknesses (CWE)
CWE-287CWE-863
References
https://lists.apache.org/thread/rylnxwttp004kvotpk9j158vb238pfkm(security@apache.org)
http://www.openwall.com/lists/oss-security/2024/12/02/1(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.