Page tree
Skip to end of metadata
Go to start of metadata

SOAP Web Services Privilege Escalation Vulnerability



SOAP Web Services Privilege Escalation Vulnerability

Severity LevelCRITICAL
Issue Date2012-08-28
Last Updated2012-08-28
Affected ProductsEucalyptus 3.0.2, 3.1.0 and earlier
CVE NumberCVE-2012-4064




A security vulnerability has been identified in the implementation of the SOAP interface exposed by front-end components in Eucalyptus 3.1.0 and earlier. An update is now available that resolves this issue. We advise immediately updating all affected Eucalyptus installations following the instructions below.


Eucalyptus front-end components (Cloud Controller and Walrus) can be accessed using the SOAP web services messaging protocol. A flaw was found in an implementation that binds external SOAP messages to internal representation, that allowed a user with valid Eucalyptus credentials to submit messages in the internal format via external services. An external user could use this flaw to escalate privileges by injecting an effective user id, respected on some code paths, into internal messages. As a result, a malicious user with valid Eucalyptus credentials could perform certain operations with privileges of Eucalyptus admin user and, in some cases, gain root privileges on the Eucalyptus host.


This issue is resolved in Eucalyptus version 3.1.1.

Please see for instructions on downloading and upgrading to the latest Eucalyptus software.

Contact and help

Contact the Eucalyptus security team at