René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

160 lines
5.4 KiB
JSON

{
"id": "CVE-2021-28798",
"sourceIdentifier": "security@qnapsecurity.com.tw",
"published": "2021-05-21T03:15:09.997",
"lastModified": "2022-10-18T21:07:17.387",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "A relative path traversal vulnerability has been reported to affect QNAP NAS running QTS and QuTS hero. If exploited, this vulnerability allows attackers to modify files that impact system integrity. QNAP have already fixed this vulnerability in the following versions: QTS 4.5.2.1630 Build 20210406 and later QTS 4.3.6.1663 Build 20210504 and later QTS 4.3.3.1624 Build 20210416 and later QuTS hero h4.5.2.1638 Build 20210414 and later QNAP NAS running QTS 4.5.3 are not affected."
},
{
"lang": "es",
"value": "Se ha reportado una vulnerabilidad de salto de ruta relativa que afecta al NAS de QNAP que ejecuta QTS y QuTS hero. Si es explotada, esta vulnerabilidad permite a atacantes modificar archivos que afectan la integridad del sistema. QNAP ya ha corregido esta vulnerabilidad en las siguientes versiones: QTS versi\u00f3n 4.5.2.1630 Build 20210406 ??y posterior QTS versi\u00f3n 4.3.6.1663 Build 20210504 y posterior QTS versi\u00f3n 4.3.3.1624 Build 20210416 y posterior QuTS hero versi\u00f3n h4.5.2.1638 Build 20210414 y posterior. QNAP NAS ejecutando QTS versi\u00f3n 4.5.3 no est\u00e1n afectados"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 5.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "security@qnapsecurity.com.tw",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-23"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.3.2.0144",
"versionEndExcluding": "4.3.3.1624",
"matchCriteriaId": "601E77EB-AB51-45FC-AE07-001F4076E0AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.3.4.0000",
"versionEndExcluding": "4.3.6.1663",
"matchCriteriaId": "FDE061FF-4B64-4321-A5F2-8B97041057C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0000",
"versionEndExcluding": "4.5.2.1630",
"matchCriteriaId": "12CFB42D-B041-443E-B629-4005FA968353"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*",
"versionEndExcluding": "h4.5.2.1638",
"matchCriteriaId": "ADA7C3AF-799D-4A93-AA53-EBDCC7967F04"
}
]
}
]
}
],
"references": [
{
"url": "https://www.qnap.com/zh-tw/security-advisory/qsa-21-14",
"source": "security@qnapsecurity.com.tw",
"tags": [
"Vendor Advisory"
]
}
]
}