An authenticated attacker is able to create alerts that trigger a stored XSS attack.
POC
* go to the alert manager
* open the ITSM tab
* add a webhook with the URL/service token value
' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters)
* click add
* click apply
* create a test alert
* The test alert will run the command
“id | tee /tmp/ttttttddddssss” as root.
* after the test alert inspect
/tmp/ttttttddddssss it'll contain the ids of the root user.
References
| Link | Resource |
|---|---|
| https://csirt.divd.nl/CVE-2021-42083 | Third Party Advisory |
| https://csirt.divd.nl/DIVD-2021-00020/ | |
| https://www.osnexus.com/products/software-defined-storage | Product |
| https://www.wbsec.nl/osnexus | Third Party Advisory |
| https://csirt.divd.nl/CVE-2021-42083 | Third Party Advisory |
| https://www.divd.nl/DIVD-2021-00020 | |
| https://www.osnexus.com/products/software-defined-storage | Product |
| https://www.wbsec.nl/osnexus | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2023-07-10 16:15
Updated : 2025-09-22 07:15
NVD link : CVE-2021-42083
Mitre link : CVE-2021-42083
CVE.ORG link : CVE-2021-42083
JSON object : View
Products Affected
microsoft
- windows
linux
- linux_kernel
osnexus
- quantastor
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
