First published: Thu Apr 04 2024(Updated: )
By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are recommended to upgrade to CloudStack version 4.18.1.1 or 4.19.0.1, which fixes this issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache CloudStack | <4.18.1.1<4.19.0.1 | |
Apache CloudStack | >=4.11.0.0<4.18.1.1 | |
Apache CloudStack | =4.19.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-29006 has been assessed as a medium severity vulnerability that can lead to authentication bypass.
To fix CVE-2024-29006, ensure that the CloudStack management server does not trust the x-forwarded-for header unless it is coming from a trusted proxy.
CVE-2024-29006 affects Apache CloudStack versions up to 4.18.1.1 and 4.19.0.1.
Yes, CVE-2024-29006 can potentially allow unauthorized access to sensitive data by exploiting the authentication bypass.
Currently, users should upgrade to a patched version of Apache CloudStack that addresses CVE-2024-29006.