Описание
An authenticated attacker is able to create alerts that trigger a stored XSS attack.
POC
-
go to the alert manager
-
open the ITSM tab
-
add a webhook with the URL/service token value
' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters)
-
click add
-
click apply
-
create a test alert
-
The test alert will run the command
“id | tee /tmp/ttttttddddssss” as root.
- after the test alert inspect
/tmp/ttttttddddssss it'll contain the ids of the root user.
Ссылки
- Third Party Advisory
- Product
- Third Party Advisory
- Third Party Advisory
- Product
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 6.0.0.355 (исключая)
Одновременно
cpe:2.3:a:osnexus:quantastor:*:*:*:*:*:*:*:*
Одно из
cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
EPSS
Процентиль: 31%
0.00117
Низкий
8.7 High
CVSS3
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79
Связанные уязвимости
CVSS3: 8.7
github
больше 2 лет назад
An authenticated attacker is able to create alerts that trigger a stored XSS attack.
EPSS
Процентиль: 31%
0.00117
Низкий
8.7 High
CVSS3
5.4 Medium
CVSS3
Дефекты
CWE-79
CWE-79