Osnexus

Quantastor

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 10.07.2023 16:15:47
  • Zuletzt bearbeitet 22.09.2025 07:15:38

An authenticated administrator is able to prepare an alert that is able to execute an SSRF attack. This is exclusively with POST requests. POC Step 1: Prepare the SSRF with a request like this: GET /qstorapi/alertConfigSet?senderEmailAddress=a&smt...

  • EPSS 0.14%
  • Veröffentlicht 10.07.2023 16:15:47
  • Zuletzt bearbeitet 22.09.2025 07:15:39

An attacker is able to launch a Reflected XSS attack using a crafted URL. POC: Visit the following URL https://<IPADDRESS>:8153/qstorapi/echo?inputMessage=<img%20src=x%20onerror=alert(document.cookie)>

  • EPSS 0.06%
  • Veröffentlicht 10.07.2023 16:15:47
  • Zuletzt bearbeitet 22.09.2025 07:15:39

An authenticated administrator is allowed to remotely execute arbitrary shell commands via the API. POC http://<IP_ADDRESS>/qstorapi/storageSystemModify?storageSystem=&newName=quantastor&newDescription=;ls${IFS}-al&newLocation=4&newEnclosureLayoutId...

  • EPSS 0.03%
  • Veröffentlicht 10.07.2023 16:15:47
  • Zuletzt bearbeitet 22.09.2025 07:15:39

Local users are able to execute scripts under root privileges. POC On the local host run the following command: curl 'localhost:8154/qstor/qs_upgrade.py?taskId=1&a=;`whoami`'

  • EPSS 0.12%
  • Veröffentlicht 10.07.2023 16:15:47
  • Zuletzt bearbeitet 22.09.2025 07:15:40

An authenticated attacker is able to create alerts that trigger a stored XSS attack. POC * go to the alert manager * open the ITSM tab * add a webhook with the URL/service token value ' -h && id | tee /tmp/ttttttddddssss #' (whitespac...

  • EPSS 0.14%
  • Veröffentlicht 10.07.2023 16:15:47
  • Zuletzt bearbeitet 24.09.2025 14:15:45

An authenticated attacker is able to create alerts that trigger a stored XSS attack. POC * go to the alert manager * open the ITSM tab * add a webhook with the URL/service token value ' -h && id | tee /tmp/ttttttddddssss #' (whitespac...

Exploit
  • EPSS 16.42%
  • Veröffentlicht 28.08.2017 19:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, a flaw was found with the error message sent as a response for users that don't exist on the system. An attacker could leverage this information to fine-tune and enumerate valid accounts on...

Exploit
  • EPSS 2.4%
  • Veröffentlicht 28.08.2017 19:29:01
  • Zuletzt bearbeitet 20.04.2025 01:37:25

On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, if the REST call invoked does not exist, an error will be triggered containing the invalid method previously invoked. The response sent to the user isn't sanitized in this case. An attacker...