On the OSNEXUS QuantaStor v4 virtual appliance before 4.3.1, if the REST call invoked does not exist, an error will be triggered containing the invalid method previously invoked. The response sent to the user isn't sanitized in this case. An attacker can leverage this issue by including arbitrary HTML or JavaScript code as a parameter, aka XSS.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.vvvsecurity.com/advisories/vvvsecurity-advisory-2017-6943.txt | url repurposed exploit third party advisory |
https://www.exploit-db.com/exploits/42517/ | exploit vdb entry third party advisory |
http://seclists.org/fulldisclosure/2017/Aug/23 | mailing list exploit third party advisory |
http://packetstormsecurity.com/files/143780/OSNEXUS-QuantaStor-4-Information-Disclosure.html | exploit vdb entry third party advisory |