CVE-2024-29006

By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are recommended to upgrade to CloudStack version 4.18.1.1 or 4.19.0.1, which fixes this issue.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:cloudstack:4.19.0.0:*:*:*:*:*:*:*

History

24 Jan 2025, 16:19

Type Values Removed Values Added
References () https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp - () https://lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp - Mailing List, Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:cloudstack:4.19.0.0:*:*:*:*:*:*:*
First Time Apache
Apache cloudstack

Information

Published : 2024-04-04 08:15

Updated : 2025-03-27 20:15


NVD link : CVE-2024-29006

Mitre link : CVE-2024-29006

CVE.ORG link : CVE-2024-29006


JSON object : View

Products Affected

apache

  • cloudstack
CWE
CWE-290

Authentication Bypass by Spoofing