René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

157 lines
5.0 KiB
JSON

{
"id": "CVE-2021-28806",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2021-06-03T03:15:08.437",
"lastModified": "2021-06-09T19:56:53.927",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A DOM-based XSS vulnerability has been reported to affect QNAP NAS running QTS and QuTS hero. If exploited, this vulnerability allows attackers to inject malicious code. This issue affects: QNAP Systems Inc. QTS versions prior to 4.5.3.1652 Build 20210428. QNAP Systems Inc. QuTS hero versions prior to h4.5.2.1638 Build 20210414. QNAP Systems Inc. QuTScloud versions prior to c4.5.5.1656 Build 20210503. This issue does not affect: QNAP Systems Inc. QTS 4.3.6; 4.3.3."
},
{
"lang": "es",
"value": "Se ha reportado una vulnerabilidad de tipo XSS basada en DOM que afecta a los NAS de QNAP que ejecutan QTS y QuTS hero. Si es explotada, esta vulnerabilidad permite a los atacantes inyectar c\u00f3digo malicioso. Este problema afecta: QNAP Systems Inc. QTS versiones anteriores a 4.5.3.1652 Build 20210428. QNAP Systems Inc. QuTS hero versiones anteriores a h4.5.2.1638 Build 20210414. QNAP Systems Inc. versiones de QuTScloud anteriores a versi\u00f3n c4.5.5.1656 Build 20210503. Este problema no afecta: QNAP Systems Inc. QTS versiones 4.3.6; 4.3.3"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 3.5
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": true
}
]
},
"weaknesses": [
{
"source": "security@qnapsecurity.com.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.5.3.1652",
"matchCriteriaId": "489F84DA-67B3-473F-9542-196F0D16D699"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
"versionEndExcluding": "h4.5.2.1638",
"matchCriteriaId": "ADA7C3AF-799D-4A93-AA53-EBDCC7967F04"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*",
"versionEndExcluding": "c4.5.5.1656",
"matchCriteriaId": "5C0BA9F4-E645-4697-AD4C-1415BA77BE26"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-22",
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
}
]
}