Lucene search

K
ApacheCloudstack

4 matches found

CVE
CVE
added 2022/03/15 4:15 p.m.104 views

CVE-2022-26779

Apache CloudStack prior to 4.16.1.0 used insecure random number generation for project invitation tokens. If a project invite is created based only on an email address, a random token is generated. An attacker with knowledge of the project ID and the fact that the invite is sent, could generate tim...

7.5CVSS7.4AI score0.03165EPSS
CVE
CVE
added 2024/08/07 8:16 a.m.61 views

CVE-2024-42062

CloudStack account-users by default use username and password based authentication for API and UI access. Account-users can generate and register randomised API and secret keys and use them for the purpose of API-based automation and integrations. Due to an access permission validation issue that a...

7.2CVSS7.8AI score0.00587EPSS
CVE
CVE
added 2024/04/04 8:15 a.m.52 views

CVE-2024-29007

The CloudStack management server and secondary storage VM could be tricked into making requests to restricted or random resources by means of following 301 HTTP redirects presented by external servers when downloading templates or ISOs. Users are recommended to upgrade to version 4.18.1.1 or 4.19.0...

7.3CVSS7.2AI score0.00083EPSS
CVE
CVE
added 2024/10/16 8:15 a.m.38 views

CVE-2024-45462

The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to gain access to resources owned by the logged out us...

7.1CVSS6.5AI score0.00051EPSS