CVE-2021-4406
Authenticated Remote COmmand Execution as root in OSNEXUS QuantaStor version 6.0.0.355 and others
| CVE | CVE-2021-4406 | |||||||||||
| Title | Authenticated Remote COmmand Execution as root in OSNEXUS QuantaStor version 6.0.0.355 and others | |||||||||||
| Credits |
|
|||||||||||
| Affected products |
|
|||||||||||
| CVSS |
Base score:
9.1
(CRITICAL) |
|||||||||||
| References |
|
|||||||||||
| Problem type(s) | CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') | |||||||||||
| Date published | ||||||||||||
| Last modified | 11 Mar 2025 13:39 UTC |
Description
An authenticated attacker is able to create alerts that trigger a stored XSS attack.
POC
POC
go to the alert manager
- open the ITSM tab
add a webhook with the URL/service token value
' -h && id | tee /tmp/ttttttddddssss #'(whitespaces are tab characters)
click add
click apply
create a test alert
The test alert will run the command
“id | tee /tmp/ttttttddddssss”as root.
after the test alert inspect
/tmp/ttttttddddssssit'll contain the ids of the root user.
Solution(s)
Upgrade to the latest version of OSNEXUS QuantaStor and hope it is fixed
JSON version.