First published: Fri Nov 03 2023(Updated: )
A server-side request forgery (SSRF) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to read application data via a network. We have already fixed the vulnerability in the following versions: QTS 5.0.1.2514 build 20230906 and later QTS 5.1.1.2491 build 20230815 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.1.2488 build 20230812 and later QuTScloud c5.1.0.2498 and later
Credit: security@qnapsecurity.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
QNAP QTS | <5.1.1.2491 | |
QNAP QTS | <5.0.1.2514 | |
QNAP QuTS hero | <h5.1.1.2488 | |
QNAP QuTS hero | <h5.0.1.2515 | |
QNAP QuTScloud | <c5.1.0.2498 |
We have already fixed the vulnerability in the following versions: QTS 5.0.1.2514 build 20230906 and later QTS 5.1.1.2491 build 20230815 and later QuTS hero h5.0.1.2515 build 20230907 and later QuTS hero h5.1.1.2488 build 20230812 and later QuTScloud c5.1.0.2498 and later
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-39301 is a server-side request forgery (SSRF) vulnerability that affects several QNAP operating system versions.
If exploited, CVE-2023-39301 could allow authenticated users to read application data via a network.
CVE-2023-39301 affects QTS versions up to but excluding 5.0.1.2514 and QuTS Hero versions up to but excluding h5.0.1.2515.
CVE-2023-39301 has a severity rating of medium, with a CVSS score of 4.3.
To fix CVE-2023-39301, users should update to the fixed versions, which are QTS 5.0.1.2514 or later, and QuTS Hero h5.0.1.2515 or later.