cve-2021-28806
Vulnerability from cvelistv5
Published
2021-06-03 02:45
Modified
2024-09-16 22:55
Severity ?
EPSS score ?
Summary
DOM-Based XSS Vulnerability in QTS and QuTS hero
References
▼ | URL | Tags | |
---|---|---|---|
security@qnapsecurity.com.tw | https://www.qnap.com/zh-tw/security-advisory/qsa-21-22 | Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:55:11.565Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-22" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "QTS", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "4.5.3.1652 Build 20210428", "status": "affected", "version": "unspecified", "versionType": "custom" }, { "status": "unaffected", "version": "4.3.6" }, { "status": "unaffected", "version": "4.3.3" } ] }, { "product": "QuTS hero", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "h4.5.2.1638 Build 20210414", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "QuTScloud", "vendor": "QNAP Systems Inc.", "versions": [ { "lessThan": "c4.5.5.1656 Build 20210503", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Marcin Zi\u0119ba" } ], "datePublic": "2021-06-03T00:00:00", "descriptions": [ { "lang": "en", "value": "A DOM-based XSS vulnerability has been reported to affect QNAP NAS running QTS and QuTS hero. If exploited, this vulnerability allows attackers to inject malicious code. This issue affects: QNAP Systems Inc. QTS versions prior to 4.5.3.1652 Build 20210428. QNAP Systems Inc. QuTS hero versions prior to h4.5.2.1638 Build 20210414. QNAP Systems Inc. QuTScloud versions prior to c4.5.5.1656 Build 20210503. This issue does not affect: QNAP Systems Inc. QTS 4.3.6; 4.3.3." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-03T02:45:13", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-22" } ], "solutions": [ { "lang": "en", "value": "QNAP have already fixed this vulnerability in the following versions:\n\nQTS 4.5.3.1652 Build 20210428 and later\nQuTS hero h4.5.2.1638 Build 20210414 and later\nQuTScloud c4.5.5.1656 Build 20210503 and later" } ], "source": { "advisory": "QSA-21-22", "discovery": "EXTERNAL" }, "title": "DOM-Based XSS Vulnerability in QTS and QuTS hero", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2021-06-03T02:06:00.000Z", "ID": "CVE-2021-28806", "STATE": "PUBLIC", "TITLE": "DOM-Based XSS Vulnerability in QTS and QuTS hero" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "QTS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "4.5.3.1652 Build 20210428" }, { "version_affected": "!", "version_value": "4.3.6" }, { "version_affected": "!", "version_value": "4.3.3" } ] } }, { "product_name": "QuTS hero", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "h4.5.2.1638 Build 20210414" } ] } }, { "product_name": "QuTScloud", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "c4.5.5.1656 Build 20210503" } ] } } ] }, "vendor_name": "QNAP Systems Inc." } ] } }, "credit": [ { "lang": "eng", "value": "Marcin Zi\u0119ba" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A DOM-based XSS vulnerability has been reported to affect QNAP NAS running QTS and QuTS hero. If exploited, this vulnerability allows attackers to inject malicious code. This issue affects: QNAP Systems Inc. QTS versions prior to 4.5.3.1652 Build 20210428. QNAP Systems Inc. QuTS hero versions prior to h4.5.2.1638 Build 20210414. QNAP Systems Inc. QuTScloud versions prior to c4.5.5.1656 Build 20210503. This issue does not affect: QNAP Systems Inc. QTS 4.3.6; 4.3.3." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-22", "refsource": "MISC", "url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-22" } ] }, "solution": [ { "lang": "en", "value": "QNAP have already fixed this vulnerability in the following versions:\n\nQTS 4.5.3.1652 Build 20210428 and later\nQuTS hero h4.5.2.1638 Build 20210414 and later\nQuTScloud c4.5.5.1656 Build 20210503 and later" } ], "source": { "advisory": "QSA-21-22", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2021-28806", "datePublished": "2021-06-03T02:45:13.325672Z", "dateReserved": "2021-03-18T00:00:00", "dateUpdated": "2024-09-16T22:55:32.202Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2021-28806\",\"sourceIdentifier\":\"security@qnapsecurity.com.tw\",\"published\":\"2021-06-03T03:15:08.437\",\"lastModified\":\"2021-06-09T19:56:53.927\",\"vulnStatus\":\"Analyzed\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"A DOM-based XSS vulnerability has been reported to affect QNAP NAS running QTS and QuTS hero. If exploited, this vulnerability allows attackers to inject malicious code. This issue affects: QNAP Systems Inc. QTS versions prior to 4.5.3.1652 Build 20210428. QNAP Systems Inc. QuTS hero versions prior to h4.5.2.1638 Build 20210414. QNAP Systems Inc. QuTScloud versions prior to c4.5.5.1656 Build 20210503. This issue does not affect: QNAP Systems Inc. QTS 4.3.6; 4.3.3.\"},{\"lang\":\"es\",\"value\":\"Se ha reportado una vulnerabilidad de tipo XSS basada en DOM que afecta a los NAS de QNAP que ejecutan QTS y QuTS hero. Si es explotada, esta vulnerabilidad permite a los atacantes inyectar c\u00f3digo malicioso. Este problema afecta: QNAP Systems Inc. QTS versiones anteriores a 4.5.3.1652 Build 20210428. QNAP Systems Inc. QuTS hero versiones anteriores a h4.5.2.1638 Build 20210414. QNAP Systems Inc. versiones de QuTScloud anteriores a versi\u00f3n c4.5.5.1656 Build 20210503. Este problema no afecta: QNAP Systems Inc. QTS versiones 4.3.6; 4.3.3\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.3,\"impactScore\":2.7},{\"source\":\"security@qnapsecurity.com.tw\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":5.7,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":2.1,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:P/A:N\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\",\"baseScore\":3.5},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"security@qnapsecurity.com.tw\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.5.3.1652\",\"matchCriteriaId\":\"489F84DA-67B3-473F-9542-196F0D16D699\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"h4.5.2.1638\",\"matchCriteriaId\":\"ADA7C3AF-799D-4A93-AA53-EBDCC7967F04\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"c4.5.5.1656\",\"matchCriteriaId\":\"5C0BA9F4-E645-4697-AD4C-1415BA77BE26\"}]}]}],\"references\":[{\"url\":\"https://www.qnap.com/zh-tw/security-advisory/qsa-21-22\",\"source\":\"security@qnapsecurity.com.tw\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.