A post-authentication reflected XSS vulnerability has been reported to affect QNAP NAS running Q’center. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already fixed this vulnerability in the following versions of Q’center: QTS 4.5.3: Q’center v1.12.1012 and later QTS 4.3.6: Q’center v1.10.1004 and later QTS 4.3.3: Q’center v1.10.1004 and later QuTS hero h4.5.2: Q’center v1.12.1012 and later QuTScloud c4.5.4: Q’center v1.12.1012 and later
References
Link | Resource |
---|---|
https://www.qnap.com/zh-tw/security-advisory/qsa-21-20 | Vendor Advisory |
https://www.shielder.it/advisories/qnap-qcenter-virtual-stored-xss/ | Exploit Third Party Advisory |
https://www.shielder.it/advisories/qnap-qcenter-post-auth-remote-code-execution-via-qpkg/ | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Information
Published : 2021-06-02 20:15
Updated : 2021-09-14 07:30
NVD link : CVE-2021-28807
Mitre link : CVE-2021-28807
JSON object : View
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Products Affected
qnap
- qts
- quts_hero
- q\'center
- qutscloud