4.3
CVSSv2

CVE-2017-9979

Published: 28/08/2017 Updated: 14/02/2024
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

On the OSNEXUS QuantaStor v4 virtual appliance prior to 4.3.1, if the REST call invoked does not exist, an error will be triggered containing the invalid method previously invoked. The response sent to the user isn't sanitized in this case. An attacker can leverage this issue by including arbitrary HTML or JavaScript code as a parameter, aka XSS.

Vulnerable Product Search on Vulmon Subscribe to Product

osnexus quantastor

Exploits

1 --- Advisory details --- Title: QuantaStor Software Define Storage mmultiple vulnerabilities Advisory ID: VVVSEC-2017-6943 Advisory URL: wwwvvvsecuritycom/advisories/vvvsecurity-advisory-2017-6943txt Date published: 12/08/2017 CVEs: CVE-2017-9978 "Brute force login request using http post mechanism returns different errors", ...
OSNEXUS QuantaStor version 4 suffers from multiple information disclosure vulnerabilities including user enumeration ...