Lucene search

K

13 matches found

CVE
CVE
added 2024/07/05 2:15 p.m.87 views

CVE-2024-39864

The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the integration API service port is disabled and is ...

9.8CVSS9.9AI score0.01922EPSS
CVE
CVE
added 2024/04/04 8:15 a.m.84 views

CVE-2024-29006

By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are recommended to upgrade ...

9.8CVSS7.1AI score0.00054EPSS
CVE
CVE
added 2024/07/19 11:15 a.m.73 views

CVE-2024-41107

The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response w...

8.1CVSS8.1AI score0.93162EPSS
CVE
CVE
added 2024/08/07 8:16 a.m.61 views

CVE-2024-42062

CloudStack account-users by default use username and password based authentication for API and UI access. Account-users can generate and register randomised API and secret keys and use them for the purpose of API-based automation and integrations. Due to an access permission validation issue that a...

7.2CVSS7.8AI score0.00587EPSS
CVE
CVE
added 2024/08/07 8:16 a.m.59 views

CVE-2024-42222

In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and dat...

4.3CVSS7AI score0.00794EPSS
CVE
CVE
added 2024/07/05 2:15 p.m.55 views

CVE-2024-38346

The CloudStack cluster service runs on unauthenticated port (default 9090) that can be misused to run arbitrary commands on targeted hypervisors and CloudStack management server hosts. Some of these commands were found to have command injection vulnerabilities that can result in arbitrary code exec...

9.8CVSS10AI score0.00975EPSS
CVE
CVE
added 2024/04/04 8:15 a.m.52 views

CVE-2024-29007

The CloudStack management server and secondary storage VM could be tricked into making requests to restricted or random resources by means of following 301 HTTP redirects presented by external servers when downloading templates or ISOs. Users are recommended to upgrade to version 4.18.1.1 or 4.19.0...

7.3CVSS7.2AI score0.00083EPSS
CVE
CVE
added 2024/04/04 8:15 a.m.50 views

CVE-2024-29008

A problem has been identified in the CloudStack additional VM configuration (extraconfig) feature which can be misused by anyone who has privilege to deploy a VM instance or configure settings of an already deployed VM instance, to configure additional VM configuration even when the feature is not ...

6.4CVSS6.5AI score0.00099EPSS
CVE
CVE
added 2024/10/16 8:15 a.m.45 views

CVE-2024-45219

Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack 4.0.0 through 4.18.2.3 ...

8.5CVSS8.8AI score0.01774EPSS
CVE
CVE
added 2024/11/12 3:15 p.m.45 views

CVE-2024-50386

Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack 4.0.0 through 4.18.2.4 and 4.19.0.0 through 4.19.1.2, an attacker tha...

9.9CVSS8.7AI score0.0122EPSS
CVE
CVE
added 2024/10/16 8:15 a.m.41 views

CVE-2024-45461

The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access...

6.3CVSS5.7AI score0.00136EPSS
CVE
CVE
added 2024/10/16 8:15 a.m.40 views

CVE-2024-45693

Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticated users and may lead to account takeover, disrup...

8.8CVSS8.1AI score0.0006EPSS
CVE
CVE
added 2024/10/16 8:15 a.m.38 views

CVE-2024-45462

The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to gain access to resources owned by the logged out us...

7.1CVSS6.5AI score0.00051EPSS