Improper Input Validation (CWE-20)
Account users in Apache CloudStack can upload and register templates for deploying instances and volumes for attaching them as data disks to existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack versions 4.0.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1, an attacker with the ability to upload or register templates and volumes can exploit this to gain access to host filesystems. This could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability issues in KVM-based infrastructure managed by CloudStack.
The impact of this vulnerability is severe. An attacker could potentially: 1. Gain unauthorized access to host filesystems 2. Compromise resource integrity and confidentiality 3. Cause data loss 4. Initiate denial of service attacks 5. Affect the availability of KVM-based infrastructure managed by CloudStack The CVSS v3.1 base score is 8.5 (High), with the following metrics: - Attack Vector: Network - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Changed - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High This high severity score indicates that the vulnerability poses a significant risk and should be prioritized for patching.
There is no evidence that a public proof-of-concept exists. There is no evidence of proof of exploitation at the moment.
Patches are available. Users are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later versions, which address this issue.
1. Upgrade to Apache CloudStack 4.18.2.4, 4.19.1.2, or later versions. 2. Scan and check all user-uploaded or registered KVM-compatible templates and volumes to ensure they are flat files without additional or unnecessary features. 3. Run the following command on secondary storage to inspect disks for potential compromise: for file in $(find /path/to/storage/ -type f -regex [a-f0-9\-]*.*); do echo "Retrieving file [$file] info. If the output is not empty, that might indicate a compromised disk; check it carefully."; qemu-img info -U $file | grep file: ; printf "\n\n"; done 4. For a more comprehensive check of template/volume features, use: for file in $(find /path/to/storage/ -type f -regex [a-f0-9\-]*.*); do echo "Retrieving file [$file] info."; qemu-img info -U $file; printf "\n\n"; done Note: When running these commands on file-based primary storages, be aware of potential false positives and false negatives due to volume creation and consolidation processes.
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
Feedly found the first article mentioning CVE-2024-45219. See article
Feedly estimated the CVSS score as HIGH
NVD published the first details for CVE-2024-45219
A CVSS base score of 8.5 has been assigned.
Detection for the vulnerability has been added to Qualys (731847)
EPSS Score was set to: 0.05% (Percentile: 16.4%)