Metrics
Affected Vendors & Products
Wed, 24 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
ssvc
|
Mon, 22 Sep 2025 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An administrator is able to execute commands as root via the alerts management dialog | An authenticated attacker is able to create alerts that trigger a stored XSS attack. POC * go to the alert manager * open the ITSM tab * add a webhook with the URL/service token value ' -h && id | tee /tmp/ttttttddddssss #' (whitespaces are tab characters) * click add * click apply * create a test alert * The test alert will run the command “id | tee /tmp/ttttttddddssss” as root. * after the test alert inspect /tmp/ttttttddddssss it'll contain the ids of the root user. |
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 13 Nov 2024 22:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Oct 2024 12:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 16 Oct 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: DIVD
Published: 2023-07-10T06:29:48.698Z
Updated: 2025-09-24T15:46:35.837Z
Reserved: 2023-07-05T15:24:56.556Z
Link: CVE-2021-4406

Updated: 2024-08-03T17:23:10.705Z

Status : Modified
Published: 2023-07-10T16:15:47.747
Modified: 2025-09-24T14:15:45.487
Link: CVE-2021-4406

No data.