First published: Tue Oct 15 2024(Updated: )
The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled. Users are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue. Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting "quota.enable.service" to "false".
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
>=4.7.0<4.18.2.4 | ||
>=4.19.0.0<4.19.1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45461 is classified as a high severity vulnerability due to its potential impact on user permissions.
To mitigate CVE-2024-45461, ensure that the quota feature is disabled unless necessary, and regularly verify user permissions and access controls.
CVE-2024-45461 affects Apache CloudStack versions from 4.7.0 to 4.18.2.4 and 4.19.0.0 to 4.19.1.2.
Yes, non-administrative users can exploit CVE-2024-45461 due to the missing access check enforcements when the quota feature is enabled.
It is not recommended to enable the quota feature in CloudStack without implementing the necessary access checks and permissions verification post-update.