CVE-2021-42083

An authenticated attacker is able to create alerts that trigger a stored XSS attack. POC * go to the alert manager * open the ITSM tab * add a webhook with the URL/service token value ' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters) * click add * click apply * create a test alert * The test alert will run the command “id | tee /tmp/ttttttddddssss” as root. * after the test alert inspect /tmp/ttttttddddssss it'll contain the ids of the root user.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:*
OR cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

22 Sep 2025, 07:15

Type Values Removed Values Added
Summary (en) An authenticated attacker is able to create alerts that trigger a stored XSS attack. (en) An authenticated attacker is able to create alerts that trigger a stored XSS attack. POC * go to the alert manager * open the ITSM tab * add a webhook with the URL/service token value ' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters) * click add * click apply * create a test alert * The test alert will run the command “id | tee /tmp/ttttttddddssss” as root. * after the test alert inspect /tmp/ttttttddddssss it'll contain the ids of the root user.

Information

Published : 2023-07-10 16:15

Updated : 2025-09-22 07:15


NVD link : CVE-2021-42083

Mitre link : CVE-2021-42083

CVE.ORG link : CVE-2021-42083


JSON object : View

Products Affected

microsoft

  • windows

linux

  • linux_kernel

osnexus

  • quantastor
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')