{"uuid": "416bf44e-b317-4bc0-83ce-67ae1234dc9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-42222", "type": "seen", "source": "https://t.me/cvedetector/2675", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-42222 - Apache CloudStack Network List API Unauthorised Access Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-42222 \nPublished : Aug. 7, 2024, 8:16 a.m. | 33\u00a0minutes ago \nDescription : In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data.  \n  \nAffected users are advised to upgrade to version 4.19.1.1 to address this issue. Users on older versions of CloudStack considering to upgrade, can skip 4.19.1.0 and upgrade directly to 4.19.1.1. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-07T11:07:02.000000Z"}