CVE-2024-39864

The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the integration API service port is disabled and is considered disabled when integration.api.port is set to 0 or negative. Due to an improper initialisation logic, the integration API service would listen on a random port when its port value is set to 0 (default value). An attacker that can access the CloudStack management network could scan and find the randomised integration API service port and exploit it to perform unauthorised administrative actions and perform remote code execution on CloudStack managed hosts and result in complete compromise of the confidentiality, integrity, and availability of CloudStack managed infrastructure. Users are recommended to restrict the network access on the CloudStack management server hosts to only essential ports. Users are recommended to upgrade to version 4.18.2.1, 4.19.0.2 or later, which addresses this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:28

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/07/05/1 - Mailing List () http://www.openwall.com/lists/oss-security/2024/07/05/1 - Mailing List
References () https://cloudstack.apache.org/blog/security-release-advisory-4.19.0.2-4.18.2.1 - Release Notes () https://cloudstack.apache.org/blog/security-release-advisory-4.19.0.2-4.18.2.1 - Release Notes
References () https://lists.apache.org/thread/6l51r00csrct61plkyd3qg3fj99215d1 - Mailing List () https://lists.apache.org/thread/6l51r00csrct61plkyd3qg3fj99215d1 - Mailing List
References () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-1-and-4-19-0-2/ - Release Notes () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-1-and-4-19-0-2/ - Release Notes

08 Jul 2024, 15:47

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2024/07/05/1 - () http://www.openwall.com/lists/oss-security/2024/07/05/1 - Mailing List
References () https://cloudstack.apache.org/blog/security-release-advisory-4.19.0.2-4.18.2.1 - () https://cloudstack.apache.org/blog/security-release-advisory-4.19.0.2-4.18.2.1 - Release Notes
References () https://lists.apache.org/thread/6l51r00csrct61plkyd3qg3fj99215d1 - () https://lists.apache.org/thread/6l51r00csrct61plkyd3qg3fj99215d1 - Mailing List
References () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-1-and-4-19-0-2/ - () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-1-and-4-19-0-2/ - Release Notes
CPE cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
First Time Apache
Apache cloudstack

08 Jul 2024, 14:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
Summary
  • (es) El servicio API de integración de CloudStack permite ejecutar su servidor API no autenticado (generalmente en el puerto 8096 cuando se configura y habilita a través de la configuración global Integration.api.port) para integraciones de portales internos y con fines de prueba. De forma predeterminada, el puerto del servicio API de integración está deshabilitado y se considera deshabilitado cuando Integration.api.port se establece en 0 o negativo. Debido a una lógica de inicialización incorrecta, el servicio API de integración escucharía en un puerto aleatorio cuando su valor de puerto se establece en 0 (valor predeterminado). Un atacante que pueda acceder a la red de administración de CloudStack podría escanear y encontrar el puerto de servicio API de integración aleatoria y explotarlo para realizar acciones administrativas no autorizadas y ejecutar código remoto en hosts administrados de CloudStack y comprometer completamente la confidencialidad, integridad y disponibilidad de Infraestructura gestionada por CloudStack. Se recomienda a los usuarios restringir el acceso a la red en los hosts del servidor de administración de CloudStack solo a los puertos esenciales. Se recomienda a los usuarios actualizar a la versión 4.18.2.1, 4.19.0.2 o posterior, que soluciona este problema.

05 Jul 2024, 15:15

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/07/05/1 -

05 Jul 2024, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-05 14:15

Updated : 2024-11-21 09:28


NVD link : CVE-2024-39864

Mitre link : CVE-2024-39864

CVE.ORG link : CVE-2024-39864


JSON object : View

Products Affected

apache

  • cloudstack
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')

CWE-665

Improper Initialization