On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, if the REST call invoked does not exist, an error will be triggered containing the invalid method previously invoked. The response sent to the user isn't sanitized in this case. An attacker can leverage this issue by including arbitrary HTML or JavaScript code as a parameter, aka XSS.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2017/Aug/23 | Exploit Mailing List Third Party Advisory |
http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt | Exploit Third Party Advisory URL Repurposed |
https://www.exploit-db.com/exploits/42517/ | Exploit Third Party Advisory VDB Entry |
Configurations
History
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt - Exploit, Third Party Advisory, URL Repurposed |
Information
Published : 2017-08-28 19:29
Updated : 2024-02-14 01:17
NVD link : CVE-2017-9979
Mitre link : CVE-2017-9979
CVE.ORG link : CVE-2017-9979
JSON object : View
Products Affected
osnexus
- quantastor
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')