CVE-2021-28807
Published Jun 3, 2021
Last updated 3 years ago
Overview
- Description
- A post-authentication reflected XSS vulnerability has been reported to affect QNAP NAS running Q’center. If exploited, this vulnerability allows remote attackers to inject malicious code. QNAP have already fixed this vulnerability in the following versions of Q’center: QTS 4.5.3: Q’center v1.12.1012 and later QTS 4.3.6: Q’center v1.10.1004 and later QTS 4.3.3: Q’center v1.10.1004 and later QuTS hero h4.5.2: Q’center v1.12.1012 and later QuTScloud c4.5.4: Q’center v1.12.1012 and later
- Source
- security@qnapsecurity.com.tw
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 5.4
- Impact score
- 2.7
- Exploitability score
- 2.3
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:N/I:P/A:N
Weaknesses
- security@qnapsecurity.com.tw
- CWE-79
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:q\\'center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CAF8C5F-53BB-42BB-89D7-78C752D32396", "versionEndExcluding": "1.12.1012" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:4.5.3:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "48622A55-7475-4A9B-A16E-547BB40593B4" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:q\\'center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9CC9D66-BF65-4229-9C30-C0BC5B21BE70", "versionEndExcluding": "1.10.1004" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:4.3.3:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C5994C07-17FE-4784-9FA4-9675BA8B4743" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:q\\'center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E9CC9D66-BF65-4229-9C30-C0BC5B21BE70", "versionEndExcluding": "1.10.1004" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qts:4.3.6:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE9FAC96-AA2A-4CA5-A170-8C0E6BD47391" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:q\\'center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CAF8C5F-53BB-42BB-89D7-78C752D32396", "versionEndExcluding": "1.12.1012" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:quts_hero:h4.5.2:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "23F7A1DB-7D99-44FA-BCFA-8EBFF810B0AD" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:qnap:q\\'center:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3CAF8C5F-53BB-42BB-89D7-78C752D32396", "versionEndExcluding": "1.12.1012" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:qnap:qutscloud:c4.5.4:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F5CCD0BB-D81A-4C66-9280-5165FAFA2358" } ], "operator": "OR" } ], "operator": "AND" } ]