{"uuid": "53209917-bb5b-4d0e-bd2f-a9d8e0b5fa82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-45461", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4102", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-45461\n\ud83d\udd25 CVSS Score: 5.6 (CVSS_V3)\n\ud83d\udd39 Description: The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. This issue affects Apache CloudStack from 4.7.0 through 4.18.2.3; and from 4.19.0.0 through 4.19.1.1, where the Quota feature is enabled.\n\n\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.4 or 4.19.1.2, or later, which addresses this issue.\u00a0Alternatively, users that do not use the Quota feature are advised to disabled the plugin by setting the global setting \"quota.enable.service\" to \"false\".\n\ud83d\udccf Published: 2024-10-16T09:30:31Z\n\ud83d\udccf Modified: 2025-02-12T12:30:46Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-45461\n2. https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2\n3. https://lists.apache.org/thread/ktsfjcnj22x4kg49ctock3d9tq7jnvlo\n4. https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-4-and-4-19-1-2\n5. http://www.openwall.com/lists/oss-security/2024/10/15/3", "creation_timestamp": "2025-02-12T13:14:13.000000Z"}