CVE-2021-4406
Severity CVSS v4.0:
Pending analysis
Type:
CWE-77
Command Injection
Publication date:
10/07/2023
Last modified:
24/09/2025
Description
An authenticated attacker is able to create alerts that trigger a stored XSS attack.<br />
<br />
POC<br />
<br />
<br />
* go to the alert manager<br />
<br />
<br />
* open the ITSM tab<br />
* add a webhook with the URL/service token value <br />
<br />
&#39; -h && id | tee /tmp/ttttttddddssss #&#39; (whitespaces are tab characters)<br />
<br />
<br />
* click add<br />
<br />
<br />
* click apply<br />
<br />
<br />
* create a test alert<br />
<br />
<br />
* The test alert will run the command <br />
<br />
“id | tee /tmp/ttttttddddssss” as root.<br />
<br />
<br />
* after the test alert inspect <br />
<br />
/tmp/ttttttddddssss it&#39;ll contain the ids of the root user.
Impact
Base Score 3.x
9.10
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:* | 6.0.0.355 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://csirt.divd.nl/CVE-2021-4406
- https://csirt.divd.nl/DIVD-2021-00020/
- https://www.osnexus.com/products/software-defined-storage
- https://csirt.divd.nl/CVE-2021-4406
- https://www.divd.nl/DIVD-2021-00020
- https://www.osnexus.com/products/software-defined-storage
- https://csirt.divd.nl/cves/CVE-2021-4406/



