A server-side request forgery (SSRF) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to read application data via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2514 build 20230906 and later
QTS 5.1.1.2491 build 20230815 and later
QuTS hero h5.0.1.2515 build 20230907 and later
QuTS hero h5.1.1.2488 build 20230812 and later
QuTScloud c5.1.0.2498 and later
References
Link | Resource |
---|---|
https://www.qnap.com/en/security-advisory/qsa-23-51 | Vendor Advisory |
https://www.qnap.com/en/security-advisory/qsa-23-51 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.qnap.com/en/security-advisory/qsa-23-51 - Vendor Advisory |
14 Nov 2023, 15:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
CPE | cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:* cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:* cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:* |
|
First Time |
Qnap quts Hero
Qnap qutscloud Qnap Qnap qts |
|
References | (MISC) https://www.qnap.com/en/security-advisory/qsa-23-51 - Vendor Advisory |
03 Nov 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-03 17:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39301
Mitre link : CVE-2023-39301
CVE.ORG link : CVE-2023-39301
JSON object : View
Products Affected
qnap
- qts
- qutscloud
- quts_hero
CWE
CWE-918
Server-Side Request Forgery (SSRF)