Vulnerability CVE-2017-9979


Published: 2017-08-28

Description:
On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, if the REST call invoked does not exist, an error will be triggered containing the invalid method previously invoked. The response sent to the user isn't sanitized in this case. An attacker can leverage this issue by including arbitrary HTML or JavaScript code as a parameter, aka XSS.

See advisories in our WLB2 database:
Topic
Author
Date
High
QuantaStor Software Defined Storage < 4.3.1 Multiple Vulnerabilities
Nahuel D. Sanche...
18.08.2017

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Osnexus -> Quantastor 

 References:
http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html
http://seclists.org/fulldisclosure/2017/Aug/23
http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt
https://www.exploit-db.com/exploits/42517/

Copyright 2024, cxsecurity.com

 

Back to Top