A post-authentication reflected XSS vulnerability has been reported to affect QNAP NAS running Q’center. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already fixed this vulnerability in the following versions of Q’center: QTS 4.5.3: Q’center v1.12.1012 and later QTS 4.3.6: Q’center v1.10.1004 and later QTS 4.3.3: Q’center v1.10.1004 and later QuTS hero h4.5.2: Q’center v1.12.1012 and later QuTScloud c4.5.4: Q’center v1.12.1012 and later
References
Link | Resource |
---|---|
https://www.qnap.com/zh-tw/security-advisory/qsa-21-20 | Vendor Advisory |
https://www.shielder.it/advisories/qnap-qcenter-post-auth-remote-code-execution-via-qpkg/ | Exploit Third Party Advisory |
https://www.shielder.it/advisories/qnap-qcenter-virtual-stored-xss/ | Exploit Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: qnap
Published: 2021-06-03T00:00:00
Updated: 2021-07-16T10:58:03
Reserved: 2021-03-18T00:00:00
Link: CVE-2021-28807
JSON object: View
NVD Information
Status : Analyzed
Published: 2021-06-03T03:15:08.533
Modified: 2021-09-14T14:30:13.457
Link: CVE-2021-28807
JSON object: View
Redhat Information
No data.
CWE