Page 2 of 8 results (0.006 seconds)

CVSS: 8.7EPSS: 0%CPEs: 3EXPL: 0

An authenticated attacker is able to create alerts that trigger a stored XSS attack. • https://csirt.divd.nl/CVE-2021-42083 https://www.divd.nl/DIVD-2021-00020 https://www.osnexus.com/products/software-defined-storage https://www.wbsec.nl/osnexus https://csirt.divd.nl/DIVD-2021-00020 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 4

On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, a flaw was found with the error message sent as a response for users that don't exist on the system. An attacker could leverage this information to fine-tune and enumerate valid accounts on the system by searching for common usernames. En la aplicación virtual OSNEXUS QuantaStor v4 en versiones anteriores a la 4.3.1, se ha encontrado un error por el cual se envía como respuesta un mensaje de error a usuarios que no existen en el sistema. Un atacante podría aprovechar esta información para ajustar y enumerar cuentas válidas en el sistema buscando nombres de usuario comunes. OSNEXUS QuantaStor version 4 suffers from multiple information disclosure vulnerabilities including user enumeration. • https://www.exploit-db.com/exploits/42517 http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html http://seclists.org/fulldisclosure/2017/Aug/23 http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 4

On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, if the REST call invoked does not exist, an error will be triggered containing the invalid method previously invoked. The response sent to the user isn't sanitized in this case. An attacker can leverage this issue by including arbitrary HTML or JavaScript code as a parameter, aka XSS. En la aplicación virtual OSNEXUS QuantaStor v4 en versiones anteriores a la 4.3.1, si la llamada REST no existe, aparecerá un error que contiene el método inválido que se ha invocado anteriormente. En este caso, la respuesta que se envía al usuario no está sanitizada. • https://www.exploit-db.com/exploits/42517 http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html http://seclists.org/fulldisclosure/2017/Aug/23 http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •