Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-39301: Vulnerability in QTS, QuTS hero, and QuTScloud - Security Advisory

A server-side request forgery (SSRF) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to read application data via a network.

We have already fixed the vulnerability in the following versions: QTS 5.0.1.2514 build 20230906 and later QTS 5.1.1.2491 build 20230815 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.1.2488 build 20230812 and later QuTScloud c5.1.0.2498 and later

CVE
#vulnerability#web#js#ssrf#auth

Security ID : QSA-23-51

  • Release date : November 4, 2023

  • CVE identifier : CVE-2023-39301

  • Affected products: QTS 5.1.x, 5.0.x; QuTS hero h5.1.x, h5.0.x; QuTScloud c5.x

Summary

A server-side request forgery (SSRF) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to read application data via a network.

We have already fixed the vulnerability in the following affected versions:

Affected Product

Fixed Version

QTS 5.1.x

QTS 5.1.1.2491 build 20230815 and later

QTS 5.0.x

QTS 5.0.1.2514 build 20230906 and later

QuTS hero h5.1.x

QuTS hero h5.1.1.2488 build 20230812 and later

QuTS hero h5.0.x

QuTS hero h5.0.1.2515 build 20230907 and later

QuTScloud c5.x

QuTScloud c5.1.0.2498 and later

Recommendation

To secure your device, we recommend regularly updating your system to the latest version to benefit from vulnerability fixes. You can check the product support status to see the latest updates available to your NAS model.

Updating QTS, QuTS hero, or QuTScloud

  1. Log in to QTS, QuTS hero, or QuTScloud as an administrator.
  2. Go to Control Panel > System > Firmware Update.
  3. Under Live Update, click Check for Update.
    The system downloads and installs the latest available update.

Tip: You can also download the update from the QNAP website. Go to Support > Download Center and then perform a manual update for your specific device.

Attachment

  • CVE-2023-39301.json

Acknowledgements: Aymen BORGI and Ibrahim AYADHI from RandoriSec

Revision History:
V1.0 (November 4, 2023) - Published

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907