CVE-2022-26779
CVSS V2 Medium 4.6
CVSS V3 High 7.5
Description
Apache CloudStack prior to 4.16.1.0 used insecure random number generation for project invitation tokens. If a project invite is created based only on an email address, a random token is generated. An attacker with knowledge of the project ID and the fact that the invite is sent, could generate time deterministic tokens and brute force attempt to use them prior to the legitimate receiver accepting the invite. This feature is not enabled by default, the attacker is required to know or guess the project ID for the invite in addition to the invitation token, and the attacker would need to be an existing authorized user of CloudStack.
Overview
- CVE ID
- CVE-2022-26779
- Assigner
- security@apache.org
- Vulnerability Status
- Analyzed
- Published Version
- 2022-03-15T16:15:09
- Last Modified Date
- 2022-03-22T16:09:30
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:* | 1 | OR | 4.16.1.0 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:H/Au:S/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- HIGH
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 4.6
- Severity
- MEDIUM
- Exploitability Score
- 3.9
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- HIGH
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 1.6
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://lists.apache.org/thread/dmm07b1cyosovqr12ddhkko501p11h2h | Mailing List Vendor Advisory |
https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-vpcc-9rh2-8jfp | Exploit Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2022/03/15/1 | Mailing List Third Party Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-26779 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26779 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 15:44:56 | Added to TrackCVE | |||
2022-12-06 12:21:32 | 2022-03-15T16:15Z | 2022-03-15T16:15:09 | CVE Published Date | updated |
2022-12-06 12:21:32 | 2022-03-22T16:09:30 | CVE Modified Date | updated | |
2022-12-06 12:21:32 | Analyzed | Vulnerability Status | updated |