mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
114 lines
4.3 KiB
JSON
114 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@qnap.com",
|
|
"DATE_PUBLIC": "2022-05-26T14:43:00.000Z",
|
|
"ID": "CVE-2021-34360",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "CSRF Bypass in Proxy Server"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Proxy Server",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"platform": "QTS 4.5.x",
|
|
"version_affected": "<",
|
|
"version_begin": "1.4.*",
|
|
"version_value": "1.4.2 ( 2021/12/30 )"
|
|
},
|
|
{
|
|
"platform": "QuTS hero h5.0.0",
|
|
"version_affected": "<",
|
|
"version_begin": "1.4.*",
|
|
"version_value": "1.4.3 ( 2022/01/18 )"
|
|
},
|
|
{
|
|
"platform": "QuTScloud c4.5.6",
|
|
"version_affected": "<",
|
|
"version_begin": "1.4.*",
|
|
"version_value": "1.4.2 ( 2021/12/30 )"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "QNAP Systems Inc."
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"credit": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Tony Martin, a security researcher"
|
|
}
|
|
],
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "A cross-site request forgery (CSRF) vulnerability has been reported to affect QNAP device running Proxy Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later QuTS hero h5.0.0: Proxy Server 1.4.3 ( 2022/01/18 ) and later QuTScloud c4.5.6: Proxy Server 1.4.2 ( 2021/12/30 ) and later"
|
|
}
|
|
]
|
|
},
|
|
"generator": {
|
|
"engine": "Vulnogram 0.0.9"
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "HIGH",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 5.3,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "REQUIRED",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-352"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"refsource": "MISC",
|
|
"url": "https://www.qnap.com/en/security-advisory/qsa-22-18",
|
|
"name": "https://www.qnap.com/en/security-advisory/qsa-22-18"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "We have already fixed this vulnerability in the following versions of Proxy Server:\nQTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later\nQuTS hero h5.0.0: Proxy Server 1.4.3 ( 2022/01/18 ) and later\nQuTScloud c4.5.6: Proxy Server 1.4.2 ( 2021/12/30 ) and later"
|
|
}
|
|
],
|
|
"source": {
|
|
"advisory": "QSA-22-18",
|
|
"discovery": "EXTERNAL"
|
|
}
|
|
} |