{
    "data_version": "4.0",
    "data_type": "CVE",
    "data_format": "MITRE",
    "CVE_data_meta": {
        "ID": "CVE-2021-39235",
        "ASSIGNER": "security@apache.org",
        "STATE": "PUBLIC"
    },
    "description": {
        "description_data": [
            {
                "lang": "eng",
                "value": "In Apache Ozone before 1.2.0, Ozone Datanode doesn't check the access mode parameter of the block token. Authenticated users with valid READ block token can do any write operation on the same block."
            }
        ]
    },
    "problemtype": {
        "problemtype_data": [
            {
                "description": [
                    {
                        "lang": "eng",
                        "value": "CWE-732 Incorrect Permission Assignment for Critical Resource",
                        "cweId": "CWE-732"
                    }
                ]
            }
        ]
    },
    "affects": {
        "vendor": {
            "vendor_data": [
                {
                    "vendor_name": "Apache Software Foundation",
                    "product": {
                        "product_data": [
                            {
                                "product_name": "Apache Ozone",
                                "version": {
                                    "version_data": [
                                        {
                                            "version_affected": "<=",
                                            "version_name": "1.0",
                                            "version_value": "1.0"
                                        }
                                    ]
                                }
                            }
                        ]
                    }
                }
            ]
        }
    },
    "references": {
        "reference_data": [
            {
                "url": "https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E",
                "refsource": "MISC",
                "name": "https://mail-archives.apache.org/mod_mbox/ozone-dev/202111.mbox/%3C93f88246-4320-7423-0dac-ec7a07f47455%40apache.org%3E"
            },
            {
                "url": "http://www.openwall.com/lists/oss-security/2021/11/19/6",
                "refsource": "MISC",
                "name": "http://www.openwall.com/lists/oss-security/2021/11/19/6"
            }
        ]
    },
    "generator": {
        "engine": "Vulnogram 0.0.9"
    },
    "source": {
        "defect": [
            "HDDS-4558",
            "HDDS-4644"
        ],
        "discovery": "UNKNOWN"
    },
    "work_around": [
        {
            "lang": "en",
            "value": "Upgrade to Apache Ozone release version 1.2.0"
        }
    ],
    "credits": [
        {
            "lang": "en",
            "value": "Apache Ozone would like to thank Marton Elek for reporting this issue."
        }
    ]
}