CVE-2022-33934

7.7 HIGH

📋 TL;DR

Dell PowerScale OneFS versions 8.2.x through 9.4.x contain stored cross-site scripting (XSS) vulnerabilities. Remote authenticated users with high privileges can inject malicious HTML/JavaScript into multiple fields, which then executes when other users view those fields. This affects organizations using vulnerable Dell PowerScale OneFS storage systems.

💻 Affected Systems

Products:
  • Dell PowerScale OneFS
Versions: 8.2.x through 9.4.x
Operating Systems: OneFS operating system
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with high privileges; affects multiple input fields in the web management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privileged attacker steals administrator credentials, takes full control of the OneFS management interface, and potentially accesses sensitive data or disrupts storage operations.

🟠

Likely Case

Attackers with high privileges perform session hijacking, steal sensitive information from other administrators, or perform unauthorized actions through the management interface.

🟢

If Mitigated

With proper privilege separation and input validation, impact is limited to isolated interface manipulation without system compromise.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with high privileges; stored XSS is relatively straightforward to implement once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: OneFS 9.4.0.0 and later

Vendor Advisory: https://www.dell.com/support/kbdoc/en-us/000205618/dsa-2022-271

Restart Required: Yes

Instructions:

1. Review Dell Security Advisory DSA-2022-271. 2. Upgrade to OneFS 9.4.0.0 or later. 3. Apply patches through the OneFS upgrade process. 4. Restart affected services as required by the upgrade.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and output encoding for user-controllable fields in custom applications.

Privilege Reduction

all

Review and reduce administrative privileges to minimum necessary levels.

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to limit script execution
  • Monitor and audit privileged user activities and input fields for suspicious content

🔍 How to Verify

Check if Vulnerable:

Check OneFS version via CLI: 'isi version' or web interface System Health > Software. If version is between 8.2.x and 9.4.x (excluding 9.4.0.0+), system is vulnerable.

Check Version:

isi version

Verify Fix Applied:

Verify version is 9.4.0.0 or later using 'isi version' command. Test affected input fields with basic XSS payloads to confirm sanitization.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML/JavaScript patterns in input fields
  • Multiple failed login attempts followed by successful privileged access
  • Administrative actions from unexpected user sessions

Network Indicators:

  • Suspicious outbound connections from OneFS management interface
  • Unexpected data exfiltration patterns

SIEM Query:

source="OneFS" AND (event_type="user_input" AND (content CONTAINS "<script>" OR content CONTAINS "javascript:"))

🔗 References

📤 Share & Export