Apache

Cloudstack

36 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 10.06.2025 23:15:58
  • Zuletzt bearbeitet 01.07.2025 20:13:33

A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This...

  • EPSS 0.06%
  • Veröffentlicht 10.06.2025 23:15:58
  • Zuletzt bearbeitet 01.07.2025 20:13:19

A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts of Admin role type. This operation is not appropriately...

  • EPSS 0.06%
  • Veröffentlicht 10.06.2025 23:15:23
  • Zuletzt bearbeitet 01.07.2025 19:25:25

When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A membe...

  • EPSS 0.1%
  • Veröffentlicht 10.06.2025 23:15:22
  • Zuletzt bearbeitet 25.06.2025 19:38:05

The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or...

  • EPSS 0.1%
  • Veröffentlicht 10.06.2025 23:12:23
  • Zuletzt bearbeitet 01.07.2025 20:14:05

In Apache CloudStack, a flaw in access control affects the listTemplates and listIsos APIs. A malicious Domain Admin or Resource Admin can exploit this issue by intentionally specifying the 'domainid' parameter along with the 'filter=self' or 'filter...

  • EPSS 13.01%
  • Veröffentlicht 13.01.2025 13:16:12
  • Zuletzt bearbeitet 01.07.2025 19:20:38

CloudStack users can add and read comments (annotations) on resources they are authorised to access.  Due to an access validation issue that affects Apache CloudStack versions from 4.16.0, users who have access, prior access or knowledge of resource...

  • EPSS 1.27%
  • Veröffentlicht 12.11.2024 15:15:10
  • Zuletzt bearbeitet 04.02.2025 18:23:49

Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack 4.0.0 through 4.18.2...

  • EPSS 0.06%
  • Veröffentlicht 16.10.2024 08:15:06
  • Zuletzt bearbeitet 21.11.2024 09:37:59

Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticat...

  • EPSS 0.05%
  • Veröffentlicht 16.10.2024 08:15:05
  • Zuletzt bearbeitet 21.11.2024 09:37:48

The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to ga...

  • EPSS 1.27%
  • Veröffentlicht 16.10.2024 08:15:05
  • Zuletzt bearbeitet 01.07.2025 20:28:53

Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates...