ID CVE-2016-6813
Summary Apache CloudStack 4.1 to 4.8.1.0 and 4.9.0.0 contain an API call designed to allow a user to register for the developer API. If a malicious user is able to determine the ID of another (non-"root") CloudStack user, the malicious user may be able to reset the API keys for the other user, in turn accessing their account and resources.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:cloudstack:4.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.3.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.3.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.3.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.4.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.4.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.4.3:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.4.3:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.4.4:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.4.4:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.5.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.5.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.5.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.5.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.6.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.6.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.7.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.7.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.7.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.7.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.7.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.8:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.8:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.8.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.8.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.8.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.8.1:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.8.1:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.8.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.8.1.0:*:*:*:*:*:*:*
  • cpe:2.3:a:apache:cloudstack:4.9.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:cloudstack:4.9.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 10-04-2023 - 16:28)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 93945
mlist
  • [cloudstack-announce] 20161027 Apache CloudStack Security Releases 4.8.1.1, 4.9.0.1
  • [www-announce] 20161028 [SECURITY] CVE-2016-6813: Apache CloudStack registerUserKeys authorization vulnerability
Last major update 10-04-2023 - 16:28
Published 06-02-2018 - 14:29
Last modified 10-04-2023 - 16:28
Back to Top