Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-45693", "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "state": "PUBLISHED", "assignerShortName": "apache", "dateReserved": "2024-09-05T00:23:11.078Z", "datePublished": "2024-10-16T07:52:25.816Z", "dateUpdated": "2024-10-16T14:57:41.020Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "Apache CloudStack", "vendor": "Apache Software Foundation", "versions": [{"lessThanOrEqual": "4.18.2.3", "status": "affected", "version": "4.15.1.0", "versionType": "semver"}, {"lessThanOrEqual": "4.19.1.1", "status": "affected", "version": "4.19.0.0", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "reporter", "value": "Arthur Souza"}, {"lang": "en", "type": "reporter", "value": "Felipe Olivaes"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "<p>Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticated users and may lead<span style=\"background-color: rgb(255, 255, 255);\"> to account takeover, </span>disruption, exposure of sensitive data and compromise integrity of the resources owned by the user account that are managed by the platform.</p><p>This issue affects Apache CloudStack from 4.15.1.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1</p><p></p><div><span style=\"background-color: rgb(252, 252, 252);\">Users are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.</span><br></div><div><div><div><div></div></div></div></div><div></div><p></p>"}], "value": "Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticated users and may lead\u00a0to account takeover,\u00a0disruption, exposure of sensitive data and compromise integrity of the resources owned by the user account that are managed by the platform.\n\nThis issue affects Apache CloudStack from 4.15.1.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue."}], "metrics": [{"other": {"content": {"text": "important"}, "type": "Textual description of severity"}}, {"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "problemTypes": [{"descriptions": [{"cweId": "CWE-352", "description": "CWE-352 Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache", "dateUpdated": "2024-10-16T07:52:25.816Z"}, "references": [{"tags": ["vendor-advisory", "patch"], "url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2"}, {"tags": ["mailing-list"], "url": "https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo"}, {"tags": ["third-party-advisory"], "url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2"}], "source": {"discovery": "UNKNOWN"}, "title": "Apache CloudStack: Request origin validation bypass makes account takeover possible", "x_generator": {"engine": "Vulnogram 0.1.0-dev"}}, "adp": [{"title": "CVE Program Container", "references": [{"url": "http://www.openwall.com/lists/oss-security/2024/10/15/5"}], "providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-10-16T08:03:43.602Z"}}, {"affected": [{"vendor": "apache", "product": "cloudstack", "cpes": ["cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "4.15.1.0", "status": "affected", "lessThanOrEqual": "4.18.2.3", "versionType": "semver"}, {"version": "4.19.0.0", "status": "affected", "lessThanOrEqual": "4.19.1.1", "versionType": "semver"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-10-16T14:55:50.101049Z", "id": "CVE-2024-45693", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-10-16T14:57:41.020Z"}}]}}