An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated administrators to execute commands via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2376 build 20230421 and later
QuTS hero h5.0.1.2376 build 20230421 and later
QuTScloud c5.1.0.2498 and later
References
Link | Resource |
---|---|
https://www.qnap.com/en/security-advisory/qsa-23-24 | Vendor Advisory |
https://www.qnap.com/en/security-advisory/qsa-23-24 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 07:46
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.qnap.com/en/security-advisory/qsa-23-24 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
21 Nov 2023, 03:08
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-10 15:15
Updated : 2024-11-21 07:46
NVD link : CVE-2023-23367
Mitre link : CVE-2023-23367
CVE.ORG link : CVE-2023-23367
JSON object : View
Products Affected
qnap
- qts
- quts_hero
- qutscloud
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')