CVE-2024-45462

6.3 MEDIUM

📋 TL;DR

This CVE describes a session expiration vulnerability in Apache CloudStack's web interface where logout doesn't properly invalidate user sessions. An attacker with access to a user's browser can reuse unexpired sessions to access the logged-out user's resources. This affects CloudStack versions 4.15.1.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1.

💻 Affected Systems

Products:
  • Apache CloudStack
Versions: 4.15.1.0 through 4.18.2.3; 4.19.0.0 through 4.19.1.1
Operating Systems: All platforms running CloudStack
Default Config Vulnerable: ⚠️ Yes
Notes: All CloudStack deployments using the web interface are affected if running vulnerable versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical or remote access to a user's browser could gain full administrative access to CloudStack infrastructure, potentially compromising virtual machines, networks, and storage resources.

🟠

Likely Case

Attackers with access to shared or public computers could hijack sessions of previously logged-in users to access their CloudStack resources and perform unauthorized actions.

🟢

If Mitigated

With proper access controls, session management, and browser security, impact is limited to temporary unauthorized access until sessions naturally expire or services restart.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the user's browser session, which could be obtained through various means including physical access, malware, or cross-site scripting attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.18.2.4 or 4.19.1.2 or later

Vendor Advisory: https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.4-4.19.1.2

Restart Required: Yes

Instructions:

1. Backup your CloudStack configuration and database. 2. Download the patched version from Apache CloudStack website. 3. Follow the official upgrade guide for your version. 4. Restart CloudStack management server and all affected services.

🔧 Temporary Workarounds

Force Session Expiry on Logout

all

Implement custom logout handling to explicitly invalidate sessions server-side

# Requires custom development to modify logout behavior

Reduce Session Timeout

all

Configure shorter session timeout values to limit exposure window

# Modify session.timeout in CloudStack configuration files

🧯 If You Can't Patch

  • Implement strict browser security policies and educate users to always close browsers after logout
  • Deploy additional authentication layers and monitor for unusual session activity

🔍 How to Verify

Check if Vulnerable:

Check CloudStack version via management server UI or query database for version information

Check Version:

# Check via CloudStack API or database: SELECT version FROM version

Verify Fix Applied:

After upgrade, test logout functionality and verify sessions are properly invalidated

📡 Detection & Monitoring

Log Indicators:

  • Multiple successful logins from same session ID after logout events
  • Unusual resource access patterns following user logout

Network Indicators:

  • Session tokens being reused after logout requests

SIEM Query:

session_id:* AND event_type:logout AND (later event_type:api_call WITH same session_id)

🔗 References

📤 Share & Export