Page 4 of 18 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Apache CloudStack 4.0.0 before 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x before 3.0.6 Patch C uses a hash of a predictable sequence, which makes it easier for remote attackers to guess the console access URL via a brute force attack. Apache CloudStack 4.0.0 anterior a 4.0.2 y Citrix CloudPlatform (anteriormente Citrix CloudStack) 3.0.x anterior a 3.0.6 Patch C utiliza un hash de una secuencia previsible, lo que facilita a atacantes remotos adivinar la URL de acceso de consola a través de un ataque de fuerza bruta. • http://mail-archives.apache.org/mod_mbox/cloudstack-dev/201304.mbox/%3C51786984.1060300%40stratosec.co%3E http://osvdb.org/92749 http://secunia.com/advisories/53175 http://secunia.com/advisories/53204 http://support.citrix.com/article/CTX135815 http://www.securityfocus.com/bid/59464 http://www.securitytracker.com/id/1028473 https://exchange.xforce.ibmcloud.com/vulnerabilities/83782 • CWE-310: Cryptographic Issues •

CVSS: 5.0EPSS: 0%CPEs: 8EXPL: 0

Apache CloudStack 4.0.0 before 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x before 3.0.6 Patch C allows remote attackers to bypass the console proxy authentication by leveraging knowledge of the source code. Apache CloudStack 4.0.0 anterior a 4.0.2 y Citrix CloudPlatform (anteriormente Citrix CloudStack) 3.0.x anterior a 3.0.6 Patch C permite a atacantes remotos evadir la autenticación de proxy de consola mediante el conocimiento del código fuente. • http://mail-archives.apache.org/mod_mbox/cloudstack-dev/201304.mbox/%3C51786984.1060300%40stratosec.co%3E http://osvdb.org/92748 http://secunia.com/advisories/53175 http://secunia.com/advisories/53204 http://support.citrix.com/article/CTX135815 http://www.securityfocus.com/bid/59463 http://www.securitytracker.com/id/1028473 https://exchange.xforce.ibmcloud.com/vulnerabilities/83781 • CWE-287: Improper Authentication •

CVSS: 1.5EPSS: 0%CPEs: 2EXPL: 0

Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API. CloudStack Apache v4.0.0-incubación y Citrix CloudPlatform (anteriormente Citrix CloudStack ) anterior a v3.0.6 almacena información sensible en el archivo de registro log4j.conf, lo que permite a usuarios locales obtener (1) la clave privada SSH registradas por la API createSSHKeyPair, (2) la contraseña de un host agregado registrada por la API AddHost, o la contraseña de un VM añadido según los registrado por el DeployVM (3) o (4) API ResetPasswordForVM. • http://mail-archives.apache.org/mod_mbox/incubator-cloudstack-users/201301.mbox/%3C1BD2169F-BBFE-4E27-B50F-F17D7D08B565%40stratosec.co%3E http://osvdb.org/89070 http://osvdb.org/89146 http://osvdb.org/89147 http://seclists.org/fulldisclosure/2013/Jan/65 http://secunia.com/advisories/51366 http://secunia.com/advisories/51821 http://secunia.com/advisories/51827 http://support.citrix.com/article/CTX136163 http://www.securityfocus.com/bid/57225 http://www.securityfocus.com/bid/5 • CWE-255: Credentials Management Errors •