Lucene search

K

29 matches found

CVE
CVE
added 2022/03/15 4:15 p.m.104 views

CVE-2022-26779

Apache CloudStack prior to 4.16.1.0 used insecure random number generation for project invitation tokens. If a project invite is created based only on an email address, a random token is generated. An attacker with knowledge of the project ID and the fact that the invite is sent, could generate tim...

7.5CVSS7.4AI score0.03165EPSS
CVE
CVE
added 2024/07/05 2:15 p.m.87 views

CVE-2024-39864

The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the integration API service port is disabled and is ...

9.8CVSS9.9AI score0.01922EPSS
CVE
CVE
added 2024/04/04 8:15 a.m.84 views

CVE-2024-29006

By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are recommended to upgrade ...

9.8CVSS7.1AI score0.00054EPSS
CVE
CVE
added 2025/01/13 1:16 p.m.78 views

CVE-2025-22828

CloudStack users can add and read comments (annotations) on resources they are authorised to access. Due to an access validation issue that affects Apache CloudStack versions from 4.16.0, users who have access, prior access or knowledge of resource UUIDs can list and add comments (annotations) to s...

4.3CVSS6.3AI score0.11896EPSS
CVE
CVE
added 2024/07/19 11:15 a.m.73 views

CVE-2024-41107

The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response w...

8.1CVSS8.1AI score0.93162EPSS
CVE
CVE
added 2025/06/10 11:15 p.m.64 views

CVE-2025-47849

A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This operation is not appropriately restricted and al...

8.8CVSS6.9AI score0.00065EPSS
CVE
CVE
added 2025/06/10 11:15 p.m.62 views

CVE-2025-47713

A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts of Admin role type. This operation is not appropriately restricted and allows the attacker to assume con...

8.8CVSS7.1AI score0.00065EPSS
CVE
CVE
added 2024/08/07 8:16 a.m.61 views

CVE-2024-42062

CloudStack account-users by default use username and password based authentication for API and UI access. Account-users can generate and register randomised API and secret keys and use them for the purpose of API-based automation and integrations. Due to an access permission validation issue that a...

7.2CVSS7.8AI score0.00587EPSS
CVE
CVE
added 2022/07/18 3:15 p.m.59 views

CVE-2022-35741

Apache CloudStack version 4.5.0 and later has a SAML 2.0 authentication Service Provider plugin which is found to be vulnerable to XML external entity (XXE) injection. This plugin is not enabled by default and the attacker would require that this plugin be enabled to exploit the vulnerability. When...

9.8CVSS10AI score0.10709EPSS
CVE
CVE
added 2024/08/07 8:16 a.m.59 views

CVE-2024-42222

In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and dat...

4.3CVSS7AI score0.00794EPSS
CVE
CVE
added 2024/07/05 2:15 p.m.55 views

CVE-2024-38346

The CloudStack cluster service runs on unauthenticated port (default 9090) that can be misused to run arbitrary commands on targeted hypervisors and CloudStack management server hosts. Some of these commands were found to have command injection vulnerabilities that can result in arbitrary code exec...

9.8CVSS10AI score0.00975EPSS
CVE
CVE
added 2024/04/04 8:15 a.m.52 views

CVE-2024-29007

The CloudStack management server and secondary storage VM could be tricked into making requests to restricted or random resources by means of following 301 HTTP redirects presented by external servers when downloading templates or ISOs. Users are recommended to upgrade to version 4.18.1.1 or 4.19.0...

7.3CVSS7.2AI score0.00083EPSS
CVE
CVE
added 2025/06/10 11:15 p.m.52 views

CVE-2025-26521

When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A member of the project who can access the CKS-based Kub...

8.1CVSS6.5AI score0.00061EPSS
CVE
CVE
added 2024/04/04 8:15 a.m.50 views

CVE-2024-29008

A problem has been identified in the CloudStack additional VM configuration (extraconfig) feature which can be misused by anyone who has privilege to deploy a VM instance or configure settings of an already deployed VM instance, to configure additional VM configuration even when the feature is not ...

6.4CVSS6.5AI score0.00099EPSS
CVE
CVE
added 2024/10/16 8:15 a.m.45 views

CVE-2024-45219

Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack 4.0.0 through 4.18.2.3 ...

8.5CVSS8.8AI score0.01774EPSS
CVE
CVE
added 2024/11/12 3:15 p.m.45 views

CVE-2024-50386

Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack 4.0.0 through 4.18.2.4 and 4.19.0.0 through 4.19.1.2, an attacker tha...

9.9CVSS8.7AI score0.0122EPSS
CVE
CVE
added 2018/02/06 2:29 p.m.44 views

CVE-2016-6813

Apache CloudStack 4.1 to 4.8.1.0 and 4.9.0.0 contain an API call designed to allow a user to register for the developer API. If a malicious user is able to determine the ID of another (non-"root") CloudStack user, the malicious user may be able to reset the API keys for the other user, in turn acce...

9.8CVSS9.3AI score0.01611EPSS
CVE
CVE
added 2024/10/16 8:15 a.m.41 views

CVE-2024-45461

The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access...

6.3CVSS5.7AI score0.00136EPSS
CVE
CVE
added 2013/08/19 11:55 p.m.40 views

CVE-2013-2136

Multiple cross-site scripting (XSS) vulnerabilities in Apache CloudStack before 4.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Physical network name to the Zone wizard; (2) New network name, (3) instance name, or (4) group to the Instance wizard; (5) unspecified "mu...

4.3CVSS5.8AI score0.06724EPSS
CVE
CVE
added 2024/10/16 8:15 a.m.40 views

CVE-2024-45693

Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticated users and may lead to account takeover, disrup...

8.8CVSS8.1AI score0.0006EPSS
CVE
CVE
added 2025/06/11 12:15 a.m.40 views

CVE-2025-30675

In Apache CloudStack, a flaw in access control affects the listTemplates and listIsos APIs. A malicious Domain Admin or Resource Admin can exploit this issue by intentionally specifying the 'domainid' parameter along with the 'filter=self' or 'filter=selfexecutable' values. This allows the attacker...

4.7CVSS4.8AI score0.0007EPSS
CVE
CVE
added 2014/01/15 4:8 p.m.38 views

CVE-2014-0031

The (1) ListNetworkACL and (2) listNetworkACLLists APIs in Apache CloudStack before 4.2.1 allow remote authenticated users to list network ACLS for other users via a crafted request.

4CVSS6.4AI score0.00323EPSS
CVE
CVE
added 2024/10/16 8:15 a.m.38 views

CVE-2024-45462

The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to gain access to resources owned by the logged out us...

7.1CVSS6.5AI score0.00051EPSS
CVE
CVE
added 2018/02/06 2:29 p.m.37 views

CVE-2013-4317

In Apache CloudStack 4.1.0 and 4.1.1, when calling the CloudStack API call listProjectAccounts as a regular, non-administrative user, the user is able to see information for accounts other than their own.

4.3CVSS4.5AI score0.00459EPSS
CVE
CVE
added 2020/05/14 5:15 p.m.34 views

CVE-2019-17562

A buffer overflow vulnerability has been found in the baremetal component of Apache CloudStack. This applies to all versions prior to 4.13.1. The vulnerability is due to the lack of validation of the mac parameter in baremetal virtual router. If you insert an arbitrary shell command into the mac pa...

9.8CVSS9.6AI score0.01905EPSS
CVE
CVE
added 2016/02/08 7:59 p.m.32 views

CVE-2015-3252

Apache CloudStack before 4.5.2 does not properly preserve VNC passwords when migrating KVM virtual machines, which allows remote attackers to gain access by connecting to the VNC server.

9.8CVSS9.5AI score0.01867EPSS
CVE
CVE
added 2014/01/15 4:8 p.m.31 views

CVE-2013-6398

The virtual router in Apache CloudStack before 4.2.1 does not preserve the source restrictions in firewall rules after being restarted, which allows remote attackers to bypass intended restrictions via a request.

2.8CVSS6.7AI score0.00989EPSS
CVE
CVE
added 2025/06/10 11:15 p.m.30 views

CVE-2025-22829

The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or disable reception of quota-related emails for an...

4.3CVSS6.5AI score0.00118EPSS
CVE
CVE
added 2015/01/15 3:59 p.m.28 views

CVE-2014-9593

Apache CloudStack before 4.3.2 and 4.4.x before 4.4.2 allows remote attackers to obtain private keys via a listSslCerts API call.

5CVSS6.8AI score0.02699EPSS