CVE-2021-42083
Authenticated Stored XSS in OSNEXUS QuantaStor 6.0.0.335
CVE | CVE-2021-42083 | |||||||||||
Title | Authenticated Stored XSS in OSNEXUS QuantaStor 6.0.0.335 | |||||||||||
Credits |
|
|||||||||||
Affected products |
|
|||||||||||
CVSS |
Base score:
8.7
(HIGH) |
|||||||||||
References |
|
|||||||||||
Problem type(s) | CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | |||||||||||
Date published | ||||||||||||
Last modified | 11 Mar 2025 13:39 UTC |
Description
An authenticated attacker is able to create alerts that trigger a stored XSS attack.
POC
POC
go to the alert manager
- open the ITSM tab
add a webhook with the URL/service token value
' -h && id | tee /tmp/ttttttddddssss #'
(whitespaces are tab characters)
click add
click apply
create a test alert
The test alert will run the command
“id | tee /tmp/ttttttddddssss”
as root.
after the test alert inspect
/tmp/ttttttddddssss
it'll contain the ids of the root user.
Solution(s)
Upgrade to the latest version of OSNEXUS QuantaStor.
JSON version.