In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data. Affected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://github.com/apache/cloudstack/issues/9456 | third party advisory issue tracking exploit |
https://cloudstack.apache.org/blog/security-release-advisory-4.19.1.1-4.18.2.3 | patch vendor advisory |
https://lists.apache.org/thread/lxqtfd6407prbw3801hb4fz3ot3t8wlj | vendor advisory mailing list |
https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-3-and-4-19-1-1/ | third party advisory |
http://www.openwall.com/lists/oss-security/2024/08/06/6 |