CVE-2013-2136
https://notcve.org/view.php?id=CVE-2013-2136
Multiple cross-site scripting (XSS) vulnerabilities in Apache CloudStack before 4.1.1 allow remote attackers to inject arbitrary web script or HTML via the (1) Physical network name to the Zone wizard; (2) New network name, (3) instance name, or (4) group to the Instance wizard; (5) unspecified "multi-edit fields;" and (6) unspecified "list view" edit fields related to global settings. Múltiples vulnerabilidades XSS en Apache CloudStack 4.1.1, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarias a través de (1) un nombre físico de red mediante el asistente de zona, (2) un nombre nuevo de red, (3) un nombre de instancia o (4) grupo en el asistente de instancias; (5) campos "multiedit" sin especificar y (6) campos editables del tipo "list view" sin especificar relacionados con los parámetros globales. • http://archives.neohapsis.com/archives/bugtraq/2013-08/0034.html http://archives.neohapsis.com/archives/bugtraq/2013-08/0047.html http://osvdb.org/96074 http://osvdb.org/96075 http://osvdb.org/96076 http://osvdb.org/96077 http://osvdb.org/96078 http://secunia.com/advisories/54399 http://www.securityfocus.com/bid/61638 https://exchange.xforce.ibmcloud.com/vulnerabilities/86258 https://issues.apache.org/jira/browse/CLOUDSTACK-2936 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2013-2758
https://notcve.org/view.php?id=CVE-2013-2758
Apache CloudStack 4.0.0 before 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x before 3.0.6 Patch C uses a hash of a predictable sequence, which makes it easier for remote attackers to guess the console access URL via a brute force attack. Apache CloudStack 4.0.0 anterior a 4.0.2 y Citrix CloudPlatform (anteriormente Citrix CloudStack) 3.0.x anterior a 3.0.6 Patch C utiliza un hash de una secuencia previsible, lo que facilita a atacantes remotos adivinar la URL de acceso de consola a través de un ataque de fuerza bruta. • http://mail-archives.apache.org/mod_mbox/cloudstack-dev/201304.mbox/%3C51786984.1060300%40stratosec.co%3E http://osvdb.org/92749 http://secunia.com/advisories/53175 http://secunia.com/advisories/53204 http://support.citrix.com/article/CTX135815 http://www.securityfocus.com/bid/59464 http://www.securitytracker.com/id/1028473 https://exchange.xforce.ibmcloud.com/vulnerabilities/83782 • CWE-310: Cryptographic Issues •
CVE-2013-2756
https://notcve.org/view.php?id=CVE-2013-2756
Apache CloudStack 4.0.0 before 4.0.2 and Citrix CloudPlatform (formerly Citrix CloudStack) 3.0.x before 3.0.6 Patch C allows remote attackers to bypass the console proxy authentication by leveraging knowledge of the source code. Apache CloudStack 4.0.0 anterior a 4.0.2 y Citrix CloudPlatform (anteriormente Citrix CloudStack) 3.0.x anterior a 3.0.6 Patch C permite a atacantes remotos evadir la autenticación de proxy de consola mediante el conocimiento del código fuente. • http://mail-archives.apache.org/mod_mbox/cloudstack-dev/201304.mbox/%3C51786984.1060300%40stratosec.co%3E http://osvdb.org/92748 http://secunia.com/advisories/53175 http://secunia.com/advisories/53204 http://support.citrix.com/article/CTX135815 http://www.securityfocus.com/bid/59463 http://www.securitytracker.com/id/1028473 https://exchange.xforce.ibmcloud.com/vulnerabilities/83781 • CWE-287: Improper Authentication •
CVE-2012-5616
https://notcve.org/view.php?id=CVE-2012-5616
Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API. CloudStack Apache v4.0.0-incubación y Citrix CloudPlatform (anteriormente Citrix CloudStack ) anterior a v3.0.6 almacena información sensible en el archivo de registro log4j.conf, lo que permite a usuarios locales obtener (1) la clave privada SSH registradas por la API createSSHKeyPair, (2) la contraseña de un host agregado registrada por la API AddHost, o la contraseña de un VM añadido según los registrado por el DeployVM (3) o (4) API ResetPasswordForVM. • http://mail-archives.apache.org/mod_mbox/incubator-cloudstack-users/201301.mbox/%3C1BD2169F-BBFE-4E27-B50F-F17D7D08B565%40stratosec.co%3E http://osvdb.org/89070 http://osvdb.org/89146 http://osvdb.org/89147 http://seclists.org/fulldisclosure/2013/Jan/65 http://secunia.com/advisories/51366 http://secunia.com/advisories/51821 http://secunia.com/advisories/51827 http://support.citrix.com/article/CTX136163 http://www.securityfocus.com/bid/57225 http://www.securityfocus.com/bid/5 • CWE-255: Credentials Management Errors •
CVE-2012-4501
https://notcve.org/view.php?id=CVE-2012-4501
Citrix Cloud.com CloudStack, and Apache CloudStack pre-release, allows remote attackers to make arbitrary API calls by leveraging the system user account, as demonstrated by API calls to delete VMs. Citrix Cloud.com CloudStack, y Apache CloudStack pre-release, permite a atacantes remotos a realizar llamadas a la API aprovechando la cuenta system, como se demostró mediante llamadas a la API para eliminar VMs. • http://archives.neohapsis.com/archives/bugtraq/2012-10/0062.html http://cloudstack.org/blog/185-cloudstack-configuration-vulnerability-discovered.html http://markmail.org/thread/yfuxgymdqwg3kcg4 • CWE-264: Permissions, Privileges, and Access Controls •