We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-29006

Apache CloudStack: x-forwarded-for HTTP header parsed by default



Description

By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are recommended to upgrade to CloudStack version 4.18.1.1 or 4.19.0.1, which fixes this issue.

Reserved 2024-03-13 | Published 2024-04-04 | Updated 2025-03-27 | Assigner apache

Problem types

CWE-290 Authentication Bypass by Spoofing

Product status

Default status
unaffected

4.11.0.0
affected

4.19.0.0
affected

Credits

Yuyang Xiao <superxyyang@gmail.com> finder

References

lists.apache.org/thread/82f46pv7mvh95ybto5hn8wlo6g8jhjvp vendor-advisory

cve.org (CVE-2024-29006)

nvd.nist.gov (CVE-2024-29006)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-29006

Support options

Helpdesk Chat, Email, Knowledgebase