CVE-2017-9979

On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, if the REST call invoked does not exist, an error will be triggered containing the invalid method previously invoked. The response sent to the user isn't sanitized in this case. An attacker can leverage this issue by including arbitrary HTML or JavaScript code as a parameter, aka XSS.
References
Link Resource
http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2017/Aug/23 Exploit Mailing List Third Party Advisory
http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt Exploit Third Party Advisory URL Repurposed
https://www.exploit-db.com/exploits/42517/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:*

History

14 Feb 2024, 01:17

Type Values Removed Values Added
References () http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt - Exploit, Third Party Advisory () http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt - Exploit, Third Party Advisory, URL Repurposed

Information

Published : 2017-08-28 19:29

Updated : 2024-02-14 01:17


NVD link : CVE-2017-9979

Mitre link : CVE-2017-9979

CVE.ORG link : CVE-2017-9979


JSON object : View

Products Affected

osnexus

  • quantastor
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')