Apache

Cloudstack

45 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 08.05.2026 12:22:56
  • Zuletzt bearbeitet 09.05.2026 07:16:09

Instances deployed via the Proxmox extension allow unauthorized access to instances belonging to other tenants. This issue affects Apache CloudStack: from 4.21.0.0 through 4.22.0.0. The Proxmox extension for CloudStack improperly uses a user-...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 12:21:27
  • Zuletzt bearbeitet 10.05.2026 15:16:27

Account users are allowed by default to register templates to be downloaded directly to the primary storage for deploying instances using the KVM hypervisor. Due to missing file name sanitization, an attacker can register malicious templates to execu...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 12:19:30
  • Zuletzt bearbeitet 09.05.2026 07:16:08

Due to multiple time-of-check time-of-use race conditions in the resource count check and increment logic, as well as missing validations, users of the platform are able to exceed the allocation limits configured for their accounts/domains. This can ...

  • EPSS 0.01%
  • Veröffentlicht 08.05.2026 12:16:04
  • Zuletzt bearbeitet 11.05.2026 12:57:20

Missing MinIO policy cleanup on bucket deletion via Apache CloudStack allows users to retain access to buckets which they previously owned. If another user creates a new bucket with the same name, the previous owners can gain unauthorized read and wr...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 12:13:18
  • Zuletzt bearbeitet 12.05.2026 13:30:53

The CloudStack Backup plugin has an improper access logic in versions 4.21.0.0 and 4.22.0.0. Anyone with authenticated user-account access in CloudStack 4.21.0.0+ environments, where this plugin is enabled and have access to specific APIs can restore...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 12:11:03
  • Zuletzt bearbeitet 12.05.2026 13:31:00

The CloudStack Backup plugin has an improper access logic in versions 4.21.0.0 and 4.22.0.0. Anyone with authenticated user-account access in CloudStack 4.21.0.0+ environments, where this plugin is enabled and have access to specific APIs can create ...

  • EPSS 0.02%
  • Veröffentlicht 08.05.2026 12:06:32
  • Zuletzt bearbeitet 11.05.2026 15:24:18

The CloudStack Backup plugin has an improper authorization logic in versions 4.21.0.0 and 4.22.0.0. Anyone with authenticated user-account access in CloudStack 4.21.0.0+ environments, where this plugin is enabled and has access to specific APIs can l...

  • EPSS 0.08%
  • Veröffentlicht 27.11.2025 11:46:25
  • Zuletzt bearbeitet 02.12.2025 14:36:02

In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * ...

  • EPSS 0.13%
  • Veröffentlicht 27.11.2025 11:40:40
  • Zuletzt bearbeitet 02.12.2025 14:38:07

In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetworkACLs - listResourceDetails - listVirtualMachinesUsageHistory - listVolumesUsageHistory While these APIs were accessible only to authorized users, ...

  • EPSS 0.22%
  • Veröffentlicht 10.06.2025 23:15:58
  • Zuletzt bearbeitet 01.07.2025 20:13:33

A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This...