CVE-2021-4406

An authenticated attacker is able to create alerts that trigger a stored XSS attack. POC * go to the alert manager * open the ITSM tab * add a webhook with the URL/service token value ' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters) * click add * click apply * create a test alert * The test alert will run the command “id | tee /tmp/ttttttddddssss” as root. * after the test alert inspect /tmp/ttttttddddssss it'll contain the ids of the root user.
Configurations

Configuration 1 (hide)

cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:*

History

24 Sep 2025, 14:15

Type Values Removed Values Added
References
  • () https://csirt.divd.nl/cves/CVE-2021-4406/ -

22 Sep 2025, 07:15

Type Values Removed Values Added
Summary (en) An administrator is able to execute commands as root via the alerts management dialog (en) An authenticated attacker is able to create alerts that trigger a stored XSS attack. POC * go to the alert manager * open the ITSM tab * add a webhook with the URL/service token value ' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters) * click add * click apply * create a test alert * The test alert will run the command “id | tee /tmp/ttttttddddssss” as root. * after the test alert inspect /tmp/ttttttddddssss it'll contain the ids of the root user.

Information

Published : 2023-07-10 16:15

Updated : 2025-09-24 14:15


NVD link : CVE-2021-4406

Mitre link : CVE-2021-4406

CVE.ORG link : CVE-2021-4406


JSON object : View

Products Affected

osnexus

  • quantastor
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')