Apache

Cloudstack

38 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 27.11.2025 11:46:25
  • Zuletzt bearbeitet 02.12.2025 14:36:02

In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * ...

  • EPSS 0.09%
  • Veröffentlicht 27.11.2025 11:40:40
  • Zuletzt bearbeitet 02.12.2025 14:38:07

In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetworkACLs - listResourceDetails - listVirtualMachinesUsageHistory - listVolumesUsageHistory While these APIs were accessible only to authorized users, ...

  • EPSS 0.09%
  • Veröffentlicht 10.06.2025 23:15:58
  • Zuletzt bearbeitet 01.07.2025 20:13:33

A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This...

  • EPSS 0.09%
  • Veröffentlicht 10.06.2025 23:15:58
  • Zuletzt bearbeitet 01.07.2025 20:13:19

A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts of Admin role type. This operation is not appropriately...

  • EPSS 0.06%
  • Veröffentlicht 10.06.2025 23:15:23
  • Zuletzt bearbeitet 01.07.2025 19:25:25

When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A membe...

  • EPSS 0.16%
  • Veröffentlicht 10.06.2025 23:15:22
  • Zuletzt bearbeitet 25.06.2025 19:38:05

The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or...

  • EPSS 0.08%
  • Veröffentlicht 10.06.2025 23:12:23
  • Zuletzt bearbeitet 01.07.2025 20:14:05

In Apache CloudStack, a flaw in access control affects the listTemplates and listIsos APIs. A malicious Domain Admin or Resource Admin can exploit this issue by intentionally specifying the 'domainid' parameter along with the 'filter=self' or 'filter...

  • EPSS 14.88%
  • Veröffentlicht 13.01.2025 13:16:12
  • Zuletzt bearbeitet 01.07.2025 19:20:38

CloudStack users can add and read comments (annotations) on resources they are authorised to access.  Due to an access validation issue that affects Apache CloudStack versions from 4.16.0, users who have access, prior access or knowledge of resource...

  • EPSS 1.27%
  • Veröffentlicht 12.11.2024 15:15:10
  • Zuletzt bearbeitet 04.02.2025 18:23:49

Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack 4.0.0 through 4.18.2...

  • EPSS 0.12%
  • Veröffentlicht 16.10.2024 08:15:06
  • Zuletzt bearbeitet 21.11.2024 09:37:59

Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticat...