Apache

Cloudstack

38 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 16.10.2024 08:15:05
  • Zuletzt bearbeitet 21.11.2024 09:37:48

The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to ga...

  • EPSS 0.11%
  • Veröffentlicht 16.10.2024 08:15:05
  • Zuletzt bearbeitet 12.02.2025 10:15:13

The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administr...

  • EPSS 0.42%
  • Veröffentlicht 16.10.2024 08:15:05
  • Zuletzt bearbeitet 01.07.2025 20:28:53

Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 07.08.2024 08:16:12
  • Zuletzt bearbeitet 14.03.2025 16:15:34

In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised ...

  • EPSS 0.12%
  • Veröffentlicht 07.08.2024 08:16:12
  • Zuletzt bearbeitet 21.11.2024 09:33:30

CloudStack account-users by default use username and password based authentication for API and UI access. Account-users can generate and register randomised API and secret keys and use them for the purpose of API-based automation and integrations. Du...

  • EPSS 93.07%
  • Veröffentlicht 19.07.2024 11:15:03
  • Zuletzt bearbeitet 19.03.2025 19:15:41

The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authe...

  • EPSS 5.37%
  • Veröffentlicht 05.07.2024 14:15:03
  • Zuletzt bearbeitet 19.03.2025 15:15:47

The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the...

  • EPSS 3.14%
  • Veröffentlicht 05.07.2024 14:15:02
  • Zuletzt bearbeitet 13.02.2025 18:18:07

The CloudStack cluster service runs on unauthenticated port (default 9090) that can be misused to run arbitrary commands on targeted hypervisors and CloudStack management server hosts. Some of these commands were found to have command injection vulne...

  • EPSS 0.14%
  • Veröffentlicht 04.04.2024 08:15:07
  • Zuletzt bearbeitet 30.06.2025 15:00:30

A problem has been identified in the CloudStack additional VM configuration (extraconfig) feature which can be misused by anyone who has privilege to deploy a VM instance or configure settings of an already deployed VM instance, to configure addition...

  • EPSS 0.1%
  • Veröffentlicht 04.04.2024 08:15:06
  • Zuletzt bearbeitet 02.09.2025 21:14:50

The CloudStack management server and secondary storage VM could be tricked into making requests to restricted or random resources by means of following 301 HTTP redirects presented by external servers when downloading templates or ISOs. Users are rec...