By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are recommended to upgrade to CloudStack version 4.18.1.1 or 4.19.0.1, which fixes this issue.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 27 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Jan 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache cloudstack |
|
| CPEs | cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:* cpe:2.3:a:apache:cloudstack:4.19.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
Apache
Apache cloudstack |
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-03-27T19:43:43.236Z
Reserved: 2024-03-13T22:56:41.313Z
Link: CVE-2024-29006
Updated: 2024-08-02T01:03:51.677Z
Status : Modified
Published: 2024-04-04T08:15:06.810
Modified: 2025-03-27T20:15:25.687
Link: CVE-2024-29006
No data.
OpenCVE Enrichment
No data.