跳转到帖子

QNAP QTS/QuTS hero: CVE-2023-47218: Unauthenticated Command Injection

recommended_posts

发布于
  • 超级管理员

QNAP QTS/QuTS hero: CVE-2023-47218: Unauthenticated Command Injection

Severity
5
CVSS
(AV:A/AC:M/Au:N/C:P/I:P/A:P)
Published
02/13/2024
Created
02/14/2024
Added
02/13/2024
Modified
02/14/2024

Description

Rapid7 Labs has identified an unauthenticated command injection vulnerability in the QNAP operating system known as QTS and QuTS hero. QTS is a core part of the firmware for numerous QNAP entry- and mid-level Network Attached Storage (NAS) devices, and QuTS hero is a core part of the firmware for numerous QNAP high-end and enterprise NAS devices. The vulnerable endpoint is the quick.cgi component, exposed by the device’s web based administration feature. The quick.cgi component is present in an uninitialized QNAP NAS device. This component is intended to be used during either manual or cloud based provisioning of a QNAP NAS device. Once a device has been successfully initialized, the quick.cgi component is disabled on the system.

An attacker with network access to an uninitialized QNAP NAS device may perform unauthenticated command injection, allowing the attacker to execute arbitrary commands on the device.

Solution(s)

  • qnap-qts-cve-2023-47218

References

  • https://attackerkb.com/topics/cve-2023-47218
  • CVE - 2023-47218
  • https://www.qnap.com/en/security-advisory/qsa-23-57
  • https://www.rapid7.com/blog/post/2024/02/13/cve-2023-47218-qnap-qts-and-quts-hero-unauthenticated-command-injection-fixed
  • 查看数 709
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…