Overview
- Description
- If exploited, this cross-site scripting vulnerability could allow remote attackers to inject malicious code. QNAP has already fixed these issues in the following QTS versions. QTS 4.4.2.1270 build 20200410 and later QTS 4.4.1.1261 build 20200330 and later QTS 4.3.6.1263 build 20200330 and later QTS 4.3.4.1282 build 20200408 and later QTS 4.3.3.1252 build 20200409 and later QTS 4.2.6 build 20200421 and later
- Source
- security@qnapsecurity.com.tw
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Known exploits
Data from CISA
- Vulnerability name
- QNAP NAS File Station Cross-Site Scripting Vulnerability
- Exploit added on
- May 24, 2022
- Exploit action due
- Jun 14, 2022
- Required action
- Apply updates per vendor instructions.
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3777F6CC-9189-4BC0-B336-62BA1EFB91A7", "versionEndExcluding": "4.2.6" }, { "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "32758EDB-15AE-4D3E-A26A-1E5AF0F9B629", "versionEndExcluding": "4.3.3.1252", "versionStartIncluding": "4.3.1.0013" }, { "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "253A2C3E-04B9-4237-B78E-D7FAD881B1EC", "versionEndExcluding": "4.3.4.1282", "versionStartIncluding": "4.3.4" }, { "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A7A639D-E2B5-4F2D-97CF-319E6FE9E991", "versionEndExcluding": "4.3.6.1263", "versionStartIncluding": "4.3.6" }, { "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B943695-5B8E-4BD1-9788-BACCFF9C6AFC", "versionEndExcluding": "4.4.1.1261", "versionStartIncluding": "4.4.0" }, { "criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "776A3547-3D39-46E7-85DD-5D117F164338", "versionEndExcluding": "4.4.2.1270", "versionStartIncluding": "4.4.2" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D3B1E3A-C9E9-4BB8-8BFC-AE1258722F85" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:build_20170517:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F523E9F-D101-4C29-A624-74E1F3F8CB7D" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:build_20190322:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1388DBE0-F6BB-44AB-81AC-BFB4E70BE820" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:build_20190730:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF3C4461-C1B6-43A1-BA5E-D6658EFD06EE" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:build_20190921:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1F11848-6FED-4D58-A177-36D280C0347C" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:build_20191107:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6259C86-FFDA-40E8-AF0C-33CC8C108DC9" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:build_20200109:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E01E157-BDF1-4B00-BA9B-6887C0C7DFF2" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:build_20200421:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D1E5368-9587-4E0A-BB65-D88069CA8490" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:build_20200611:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B63CE419-871C-4866-8AB1-4BB6461E1D74" }, { "criteria": "cpe:2.3:o:qnap:qts:4.2.6:build_20200821:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "886A71D1-9615-47A5-B3C2-CBC6F02961A4" } ], "operator": "OR" } ] } ]