Credit: This issue was discovered and reported by "v3ged0ge".

Updated: https://blogs.apache.org/cloudstack/entry/cve-2022-35741

Regards.


On Mon, Jul 18, 2022 at 7:17 PM Rohit Yadav <ro...@apache.org> wrote:
>
> Apache CloudStack version 4.5.0 and later has a SAML 2.0
> authentication Service Provider plugin which is found to be vulnerable
> to XML external entity (XXE) injection. This plugin is not enabled by
> default and the attacker would require that this plugin be enabled to
> exploit the vulnerability. When the SAML 2.0 plugin is enabled in
> affected versions of Apache CloudStack could potentially allow the
> exploitation of XXE vulnerabilities.
>
> The SAML 2.0 messages constructed during the authentication flow in
> Apache CloudStack are XML-based and the XML data is parsed by various
> standard libraries that are now understood to be vulnerable to XXE
> injection attacks such as arbitrary file reading, possible denial of
> service, server-side request forgery (SSRF) on the CloudStack
> management server.
>
> As of 18th July 2022, this is now tracked under CVE-2022-35741:
> https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-35741
>
> To mitigate the risk, a CloudStack admin can do any of the following:
>
> 1. Disable the SAML 2.0 plugin by setting `saml2.enabled` to false and
> restart the management servers.
>
> 2. Upgrade to Apache CloudStack 4.16.1.1 or 4.17.0.1 or higher.
>
> --

Reply via email to