OSNEXUS QuantaStor 4.3.0

CPE Details

OSNEXUS QuantaStor 4.3.0
4.3.0
2020-09-22
09h48 +00:00
2020-09-22
09h48 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:osnexus:quantastor:4.3.0:*:*:*:*:*:*:*

Informations

Vendor

osnexus

Product

quantastor

Version

4.3.0

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-4406 2023-07-10 06h29 +00:00 An administrator is able to execute commands as root via the alerts management dialog
9.1
Critique
CVE-2021-42081 2023-07-10 06h29 +00:00 An authenticated administrator is allowed to remotely execute arbitrary shell commands via the API.
9.1
Critique
CVE-2021-42079 2023-07-10 06h29 +00:00 An authenticated administrator is able to prepare an alert that is able to execute an SSRF attack. This is exclusively with POST requests.
6.2
Moyen
CVE-2021-42080 2023-07-10 06h29 +00:00 An attacker is able to launch a Reflected XSS attack using a crafted URL.
7.4
Haute
CVE-2021-42082 2023-07-10 06h29 +00:00 Local users are able to execute scripts under root privileges.
7.8
Haute
CVE-2021-42083 2023-07-10 06h29 +00:00 An authenticated attacker is able to create alerts that trigger a stored XSS attack.
8.7
Haute
CVE-2017-9978 2017-08-28 17h00 +00:00 On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, a flaw was found with the error message sent as a response for users that don't exist on the system. An attacker could leverage this information to fine-tune and enumerate valid accounts on the system by searching for common usernames.
5.3
Moyen
CVE-2017-9979 2017-08-28 17h00 +00:00 On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, if the REST call invoked does not exist, an error will be triggered containing the invalid method previously invoked. The response sent to the user isn't sanitized in this case. An attacker can leverage this issue by including arbitrary HTML or JavaScript code as a parameter, aka XSS.
6.1
Moyen