Site icon TheCyberThrone

Apache CloudStack fixes several vulnerabilities

Advertisements

Apache CloudStack project has announced the release of LTS security releases 4.18.2.4 and 4.19.1.2 to address four security vulnerabilities

The most severe vulnerability, CVE-2024-45219 with a CVSS score of 8.5, could allow attackers to compromise KVM-based infrastructure. This vulnerability stems from a lack of validation checks, enabling attackers to deploy malicious instances or attach compromised volumes to gain access to host filesystems.

The advisory states, Uploaded and registered templates and volumes can be used to abuse KVM-based infrastructure. This could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of KVM-based infrastructure managed by CloudStack.

Advertisements

The second high severity flaw, CVE-2024-45693 with a CVSS score of 8.0, involves a request origin validation bypass that could lead to account takeover. Attackers could trick logged-in users into submitting malicious requests, potentially granting access to sensitive data and control over the user’s resources.

Other two medium severity vulnerabilities were also patched:

The Apache CloudStack project strongly recommends that users upgrade to versions 4.18.2.4 or 4.19.1.2 to mitigate these vulnerabilities. The advisory also provides detailed instructions on how to scan and validate templates and volumes to ensure they are not compromised.

Fro more information refer to the advisory

Exit mobile version