// For flags

CVE-2024-39864

Apache CloudStack: Integration API service uses dynamic port when disabled

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the integration API service port is disabled and is considered disabled when integration.api.port is set to 0 or negative. Due to an improper initialisation logic, the integration API service would listen on a random port when its port value is set to 0 (default value). An attacker that can access the CloudStack management network could scan and find the randomised integration API service port and exploit it to perform unauthorised administrative actions and perform remote code execution on CloudStack managed hosts and result in complete compromise of the confidentiality, integrity, and availability of CloudStack managed infrastructure.

Users are recommended to restrict the network access on the CloudStack management server hosts to only essential ports. Users are recommended to upgrade to version 4.18.2.1, 4.19.0.2 or later, which addresses this issue.

El servicio API de integración de CloudStack permite ejecutar su servidor API no autenticado (generalmente en el puerto 8096 cuando se configura y habilita a través de la configuración global Integration.api.port) para integraciones de portales internos y con fines de prueba. De forma predeterminada, el puerto del servicio API de integración está deshabilitado y se considera deshabilitado cuando Integration.api.port se establece en 0 o negativo. Debido a una lógica de inicialización incorrecta, el servicio API de integración escucharía en un puerto aleatorio cuando su valor de puerto se establece en 0 (valor predeterminado). Un atacante que pueda acceder a la red de administración de CloudStack podría escanear y encontrar el puerto de servicio API de integración aleatoria y explotarlo para realizar acciones administrativas no autorizadas y ejecutar código remoto en hosts administrados de CloudStack y comprometer completamente la confidencialidad, integridad y disponibilidad de Infraestructura gestionada por CloudStack. Se recomienda a los usuarios restringir el acceso a la red en los hosts del servidor de administración de CloudStack solo a los puertos esenciales. Se recomienda a los usuarios actualizar a la versión 4.18.2.1, 4.19.0.2 o posterior, que soluciona este problema.

*Credits: Adam Pond of Apple Services Engineering Security, Terry Thibault of Apple Services Engineering Security, Damon Smith of Apple Services Engineering Security
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2024-07-01 CVE Reserved
  • 2024-07-05 CVE Published
  • 2024-07-09 EPSS Updated
  • 2024-08-02 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
  • CWE-665: Improper Initialization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Cloudstack
Search vendor "Apache" for product "Cloudstack"
>= 4.0.0 < 4.18.2.1
Search vendor "Apache" for product "Cloudstack" and version " >= 4.0.0 < 4.18.2.1"
-
Affected
Apache
Search vendor "Apache"
Cloudstack
Search vendor "Apache" for product "Cloudstack"
>= 4.19.0.0 < 4.19.0.2
Search vendor "Apache" for product "Cloudstack" and version " >= 4.19.0.0 < 4.19.0.2"
-
Affected