First published: Thu May 26 2022(Updated: )
A cross-site request forgery (CSRF) vulnerability has been reported to affect QNAP device running Proxy Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later QuTS hero h5.0.0: Proxy Server 1.4.3 ( 2022/01/18 ) and later QuTScloud c4.5.6: Proxy Server 1.4.2 ( 2021/12/30 ) and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Qnap Nas Proxy Server | >=1.4.0<1.4.2 | |
QNAP QTS | >=4.5.1<=4.5.4.2012 | |
Qnap Nas Proxy Server | >=1.4.0<1.4.3 | |
QNAP QuTS hero | =h5.0.0 | |
QNAP QuTScloud | =c4.5.6 |
We have already fixed this vulnerability in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later QuTS hero h5.0.0: Proxy Server 1.4.3 ( 2022/01/18 ) and later QuTScloud c4.5.6: Proxy Server 1.4.2 ( 2021/12/30 ) and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The CVE ID of this vulnerability is CVE-2021-34360.
CVE-2021-34360 has a severity rating of 8.8 (high).
QNAP devices running Proxy Server, specifically Qnap Nas Proxy Server.
CVE-2021-34360 can be exploited by remote attackers to inject malicious code using a cross-site request forgery (CSRF) attack.
Yes, this vulnerability has been fixed in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.3, Qnap Nas Proxy Server 1.4.3.