CVE-2017-9979

On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, if the REST call invoked does not exist, an error will be triggered containing the invalid method previously invoked. The response sent to the user isn't sanitized in this case. An attacker can leverage this issue by including arbitrary HTML or JavaScript code as a parameter, aka XSS.
References
Link Resource
https://www.exploit-db.com/exploits/42517/ Exploit Third Party Advisory VDB Entry
http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2017/Aug/23 Exploit Mailing List Third Party Advisory
http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html Exploit Third Party Advisory VDB Entry
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:*

Information

Published : 2017-08-28 12:29

Updated : 2017-09-07 19:28


NVD link : CVE-2017-9979

Mitre link : CVE-2017-9979


JSON object : View

CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Advertisement

dedicated server usa

Products Affected

osnexus

  • quantastor