CVE-2024-42222

In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data. Affected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:cloudstack:4.19.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 09:33

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2024/08/06/6 -

29 Aug 2024, 16:43

Type Values Removed Values Added
CWE NVD-CWE-noinfo
First Time Apache cloudstack
Apache
References () https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3 - () https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3 - Vendor Advisory
References () https://github.com/apache/cloudstack/issues/9456 - () https://github.com/apache/cloudstack/issues/9456 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.apache.org/thread/lxqtfd6407prbw3801hb4fz3ot3t8wlj - () https://lists.apache.org/thread/lxqtfd6407prbw3801hb4fz3ot3t8wlj - Mailing List, Vendor Advisory
References () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-3-and-4-19-1-1/ - () https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-3-and-4-19-1-1/ - Third Party Advisory
CPE cpe:2.3:a:apache:cloudstack:4.19.1.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3

07 Aug 2024, 15:17

Type Values Removed Values Added
Summary
  • (es) En Apache CloudStack 4.19.1.0, una regresión en la API de listado de redes permite el acceso no autorizado a la lista de detalles de la red para el administrador del dominio y las cuentas de usuario normales. Esta vulnerabilidad compromete el aislamiento de los inquilinos, lo que podría provocar un acceso no autorizado a los detalles, las configuraciones y los datos de la red. Se recomienda a los usuarios afectados que actualicen a la versión 4.19.1.1 para solucionar este problema. Los usuarios de versiones anteriores de CloudStack que estén considerando actualizar, pueden omitir 4.19.1.0 y actualizar directamente a 4.19.1.1.

07 Aug 2024, 08:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-08-07 08:16

Updated : 2024-11-21 09:33


NVD link : CVE-2024-42222

Mitre link : CVE-2024-42222

CVE.ORG link : CVE-2024-42222


JSON object : View

Products Affected

apache

  • cloudstack
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo