A post-authentication reflected XSS vulnerability has been reported to affect QNAP NAS running Q’center. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already fixed this vulnerability in the following versions of Q’center: QTS 4.5.3: Q’center v1.12.1012 and later QTS 4.3.6: Q’center v1.10.1004 and later QTS 4.3.3: Q’center v1.10.1004 and later QuTS hero h4.5.2: Q’center v1.12.1012 and later QuTScloud c4.5.4: Q’center v1.12.1012 and later
Solution:
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.qnap.com/zh-tw/security-advisory/qsa-21-20 | vendor advisory |
https://www.shielder.it/advisories/qnap-qcenter-virtual-stored-xss/ | third party advisory exploit |
https://www.shielder.it/advisories/qnap-qcenter-post-auth-remote-code-execution-via-qpkg/ | third party advisory exploit |