Apache

Cloudstack

36 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Veröffentlicht 16.10.2024 08:15:05
  • Zuletzt bearbeitet 12.02.2025 10:15:13

The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administr...

Exploit
  • EPSS 0.39%
  • Veröffentlicht 07.08.2024 08:16:12
  • Zuletzt bearbeitet 14.03.2025 16:15:34

In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised ...

  • EPSS 0.11%
  • Veröffentlicht 07.08.2024 08:16:12
  • Zuletzt bearbeitet 21.11.2024 09:33:30

CloudStack account-users by default use username and password based authentication for API and UI access. Account-users can generate and register randomised API and secret keys and use them for the purpose of API-based automation and integrations. Du...

  • EPSS 92.9%
  • Veröffentlicht 19.07.2024 11:15:03
  • Zuletzt bearbeitet 19.03.2025 19:15:41

The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authe...

  • EPSS 4.03%
  • Veröffentlicht 05.07.2024 14:15:03
  • Zuletzt bearbeitet 19.03.2025 15:15:47

The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the...

  • EPSS 2.01%
  • Veröffentlicht 05.07.2024 14:15:02
  • Zuletzt bearbeitet 13.02.2025 18:18:07

The CloudStack cluster service runs on unauthenticated port (default 9090) that can be misused to run arbitrary commands on targeted hypervisors and CloudStack management server hosts. Some of these commands were found to have command injection vulne...

  • EPSS 0.14%
  • Veröffentlicht 04.04.2024 08:15:07
  • Zuletzt bearbeitet 30.06.2025 15:00:30

A problem has been identified in the CloudStack additional VM configuration (extraconfig) feature which can be misused by anyone who has privilege to deploy a VM instance or configure settings of an already deployed VM instance, to configure addition...

  • EPSS 0.1%
  • Veröffentlicht 04.04.2024 08:15:06
  • Zuletzt bearbeitet 02.09.2025 21:14:50

The CloudStack management server and secondary storage VM could be tricked into making requests to restricted or random resources by means of following 301 HTTP redirects presented by external servers when downloading templates or ISOs. Users are rec...

  • EPSS 0.07%
  • Veröffentlicht 04.04.2024 08:15:06
  • Zuletzt bearbeitet 27.03.2025 20:15:25

By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP ad...

  • EPSS 19.42%
  • Veröffentlicht 18.07.2022 15:15:08
  • Zuletzt bearbeitet 21.11.2024 07:11:34

Apache CloudStack version 4.5.0 and later has a SAML 2.0 authentication Service Provider plugin which is found to be vulnerable to XML external entity (XXE) injection. This plugin is not enabled by default and the attacker would require that this plu...