An authenticated attacker is able to create alerts that trigger a stored XSS attack.
POC
* go to the alert manager
* open the ITSM tab
* add a webhook with the URL/service token value
' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters)
* click add
* click apply
* create a test alert
* The test alert will run the command
“id | tee /tmp/ttttttddddssss” as root.
* after the test alert inspect
/tmp/ttttttddddssss it'll contain the ids of the root user.
References
Link | Resource |
---|---|
https://csirt.divd.nl/CVE-2021-4406 | Third Party Advisory |
https://csirt.divd.nl/DIVD-2021-00020/ | |
https://www.osnexus.com/products/software-defined-storage | Product |
https://csirt.divd.nl/CVE-2021-4406 | Third Party Advisory |
https://www.divd.nl/DIVD-2021-00020 | |
https://www.osnexus.com/products/software-defined-storage | Product |
https://csirt.divd.nl/cves/CVE-2021-4406/ |
Configurations
History
24 Sep 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
22 Sep 2025, 07:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) An authenticated attacker is able to create alerts that trigger a stored XSS attack. POC * go to the alert manager * open the ITSM tab * add a webhook with the URL/service token value ' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters) * click add * click apply * create a test alert * The test alert will run the command “id | tee /tmp/ttttttddddssss” as root. * after the test alert inspect /tmp/ttttttddddssss it'll contain the ids of the root user. |
Information
Published : 2023-07-10 16:15
Updated : 2025-09-24 14:15
NVD link : CVE-2021-4406
Mitre link : CVE-2021-4406
CVE.ORG link : CVE-2021-4406
JSON object : View
Products Affected
osnexus
- quantastor
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')