cvelist/2023/23xxx/CVE-2023-23354.json

119 lines
4.5 KiB
JSON
Raw Normal View History

2023-01-11 21:00:39 +00:00
{
2024-12-19 02:00:55 +00:00
"data_version": "4.0",
2023-01-11 21:00:39 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2023-23354",
2024-12-19 02:00:55 +00:00
"ASSIGNER": "security@qnap.com",
"STATE": "PUBLIC"
2023-01-11 21:00:39 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-12-19 02:00:55 +00:00
"value": "A cross-site scripting (XSS) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers who have gained user access to bypass security mechanisms or read application data.\n\nWe have already fixed the vulnerability in the following versions:\nQuLog Center 1.5.0.738 ( 2023/03/06 ) and later\nQuLog Center 1.4.1.691 ( 2023/03/01 ) and later\nQuLog Center 1.3.1.645 ( 2023/02/22 ) and later"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-79",
"cweId": "CWE-79"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "QNAP Systems Inc.",
"product": {
"product_data": [
{
"product_name": "QuLog Center",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "1.5.x.x",
"version_value": "1.5.0.738 ( 2023/03/06 )"
},
{
"version_affected": "<",
"version_name": "1.4.x.x",
"version_value": "1.4.1.691 ( 2023/03/01 )"
},
{
"version_affected": "<",
"version_name": "1.3.x.x",
"version_value": "1.3.1.645 ( 2023/02/22 )"
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://www.qnap.com/en/security-advisory/qsa-23-13",
"refsource": "MISC",
"name": "https://www.qnap.com/en/security-advisory/qsa-23-13"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"advisory": "QSA-23-13",
"discovery": "EXTERNAL"
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "We have already fixed the vulnerability in the following versions:<br>QuLog Center 1.5.0.738 ( 2023/03/06 ) and later<br>QuLog Center 1.4.1.691 ( 2023/03/01 ) and later<br>QuLog Center 1.3.1.645 ( 2023/02/22 ) and later<br>"
}
],
"value": "We have already fixed the vulnerability in the following versions:\nQuLog Center 1.5.0.738 ( 2023/03/06 ) and later\nQuLog Center 1.4.1.691 ( 2023/03/01 ) and later\nQuLog Center 1.3.1.645 ( 2023/02/22 ) and later"
}
],
"credits": [
{
"lang": "en",
"value": "Kaibro"
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
2023-01-11 21:00:39 +00:00
}
]
}
}