
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2024-41107 affects the SAML authentication mechanism in Apache CloudStack. The vulnerability was discovered in July 2024 and affects Apache CloudStack versions 4.5.0 through 4.18.2.1 and 4.19.0.0 through 4.19.0.2. The issue was initially reported by Christian Gross of Netcloud AG and later identified as a security issue by members of the Apple Services Engineering Security team (Apache Advisory).
The vulnerability exists in CloudStack's SAML authentication system, which is disabled by default. The core issue is that the system does not enforce signature checks when SAML authentication is enabled. This allows attackers to bypass authentication by submitting spoofed SAML responses without signatures, along with known or guessed username and other user details of SAML-enabled CloudStack user accounts. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (NVD).
If exploited, this vulnerability can result in a complete compromise of resources owned and accessible by a SAML-enabled user account. The impact is particularly severe in environments where SAML authentication is enabled, as attackers could gain unauthorized access to critical cloud infrastructure and resources (Security Online).
Two mitigation options are available: 1) Disable SAML authentication by setting the 'saml2.enabled' global setting to 'false', or 2) Upgrade to version 4.18.2.2, 4.19.1.0 or later, which addresses this issue. These security patches have been released by Apache CloudStack to fix the vulnerability (ShapeBlue Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."