OnApp before 5.0.0-88, 5.5.0-93, and 6.0.0-196 allows an attacker to run arbitrary commands with root privileges on servers managed by OnApp for XEN/KVM hypervisors. To exploit the vulnerability an attacker has to have control of a single server on a given cloud (e.g. by renting one). From the source server, the attacker can craft any command and trigger the OnApp platform to execute that command with root privileges on a target server.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Onapp | Onapp | 5.0.0 (including) | 5.0.0 (including) |
Onapp | Onapp | 5.0.0-update_79 (including) | 5.0.0-update_79 (including) |
Onapp | Onapp | 5.0.0-update_82 (including) | 5.0.0-update_82 (including) |
Onapp | Onapp | 5.0.0-update_83 (including) | 5.0.0-update_83 (including) |
Onapp | Onapp | 5.0.0-update_87 (including) | 5.0.0-update_87 (including) |
Onapp | Onapp | 5.1.0 (including) | 5.1.0 (including) |
Onapp | Onapp | 5.1.0-update_16 (including) | 5.1.0-update_16 (including) |
Onapp | Onapp | 5.2.0 (including) | 5.2.0 (including) |
Onapp | Onapp | 5.3.0 (including) | 5.3.0 (including) |
Onapp | Onapp | 5.3.0-update_41 (including) | 5.3.0-update_41 (including) |
Onapp | Onapp | 5.4.0 (including) | 5.4.0 (including) |
Onapp | Onapp | 5.4.0-update_66 (including) | 5.4.0-update_66 (including) |
Onapp | Onapp | 5.4.0-update_70 (including) | 5.4.0-update_70 (including) |
Onapp | Onapp | 5.4.0-update_72 (including) | 5.4.0-update_72 (including) |
Onapp | Onapp | 5.4.0-update_76 (including) | 5.4.0-update_76 (including) |
Onapp | Onapp | 5.4.0-update_82 (including) | 5.4.0-update_82 (including) |
Onapp | Onapp | 5.4.0-update_84 (including) | 5.4.0-update_84 (including) |
Onapp | Onapp | 5.5.0 (including) | 5.5.0 (including) |
Onapp | Onapp | 5.5.0-update_50 (including) | 5.5.0-update_50 (including) |
Onapp | Onapp | 5.5.0-update_59 (including) | 5.5.0-update_59 (including) |
Onapp | Onapp | 5.5.0-update_65 (including) | 5.5.0-update_65 (including) |
Onapp | Onapp | 5.5.0-update_75 (including) | 5.5.0-update_75 (including) |
Onapp | Onapp | 5.5.0-update_80 (including) | 5.5.0-update_80 (including) |
Onapp | Onapp | 5.5.0-update_83 (including) | 5.5.0-update_83 (including) |
Onapp | Onapp | 5.5.0-update_87 (including) | 5.5.0-update_87 (including) |
Onapp | Onapp | 5.5.0-update_90 (including) | 5.5.0-update_90 (including) |
Onapp | Onapp | 5.5.0-update_92 (including) | 5.5.0-update_92 (including) |
Onapp | Onapp | 5.6.0 (including) | 5.6.0 (including) |
Onapp | Onapp | 5.6.0-update_83 (including) | 5.6.0-update_83 (including) |
Onapp | Onapp | 5.7.0 (including) | 5.7.0 (including) |
Onapp | Onapp | 5.8.0 (including) | 5.8.0 (including) |
Onapp | Onapp | 5.9.0 (including) | 5.9.0 (including) |
Onapp | Onapp | 5.10.0 (including) | 5.10.0 (including) |
Onapp | Onapp | 6.0-update_122 (including) | 6.0-update_122 (including) |
Onapp | Onapp | 6.0-update_152 (including) | 6.0-update_152 (including) |
Onapp | Onapp | 6.0-update_159 (including) | 6.0-update_159 (including) |
Onapp | Onapp | 6.0-update_62 (including) | 6.0-update_62 (including) |
Onapp | Onapp | 6.0-update_80 (including) | 6.0-update_80 (including) |
Onapp | Onapp | 6.0-update_98 (including) | 6.0-update_98 (including) |
Onapp | Onapp | 6.0.0 (including) | 6.0.0 (including) |