POC详情: 7e70e0509728cde3f499c5f3a14bba47837cfba5

来源
关联漏洞
标题: Apache CloudStack 安全漏洞 (CVE-2025-22828)
描述:Apache CloudStack是美国阿帕奇(Apache)基金会的一套基础架构即服务(IaaS)云计算平台。该平台主要用于部署和管理大型虚拟机网络。 Apache CloudStack 4.16.0版本存在安全漏洞,该漏洞源于存在访问验证问题,允许用户通过资源UUID列出或添加评论来导致信息泄露。
描述
Apache CloudStack vulnerability allows unauthorized access to annotations on certain resources.
介绍
# CVE-2025-22828

## 📜 Description
Apache CloudStack 4.16.0 and later versions have a broken access control issue that allows users with knowledge of resource UUIDs to read or add comments (annotations) on resources they are not authorized to access.

## 🔍 Vulnerability Details
- **Type:** Broken Access Control
- **Impact:** Unauthorized access to annotations and potentially sensitive data.
- **Affected Versions:** 4.16.0 and later
- **CWE:** Exposure of Sensitive Information to an Unauthorized Actor (CWE-200)

## 🎬 Demonstration Videos

### Unauthorized Access to Annotations (listAnnotations command)
<a href="https://youtu.be/fVo9CmrZelc" target="_blank">
  <img src="https://img.youtube.com/vi/fVo9CmrZelc/maxresdefault.jpg" width="600" height="350"/>
</a>

### Unauthorized Adding of Annotations (addAnnotations command)
<a href="https://youtu.be/m6hWGJ7g8fQ" target="_blank">
  <img src="https://img.youtube.com/vi/m6hWGJ7g8fQ/maxresdefault.jpg" width="600" height="350"/>
</a>

## 🧑‍💻 Discovery

The **CVE-2025-22828** vulnerability was discovered by **Alex Perrakis** (Stolichnayer).

## 🔗 References
- [CVE-2025-22828 on Apache CloudStack Blog](https://cloudstack.apache.org/blog/unauthorised-access-to-annotations/)
- [CVE-2025-22828 on CVE Program](https://www.cve.org/CVERecord?id=CVE-2025-22828)
- [CVE-2025-22828 on NIST](https://nvd.nist.gov/vuln/detail/CVE-2025-22828)
  
文件快照

[4.0K] /data/pocs/7e70e0509728cde3f499c5f3a14bba47837cfba5 └── [1.4K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。