Vulnerability Details : CVE-2023-39301
A server-side request forgery (SSRF) vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow authenticated users to read application data via a network.
We have already fixed the vulnerability in the following versions:
QTS 5.0.1.2514 build 20230906 and later
QTS 5.1.1.2491 build 20230815 and later
QuTS hero h5.0.1.2515 build 20230907 and later
QuTS hero h5.1.1.2488 build 20230812 and later
QuTScloud c5.1.0.2498 and later
Vulnerability category: Server-side request forgery (SSRF)
Products affected by CVE-2023-39301
- cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*
- cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*
- cpe:2.3:o:qnap:quts_hero:*:*:*:*:*:*:*:*
- cpe:2.3:o:qnap:qutscloud:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-39301
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 22 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-39301
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
NIST | |
4.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
2.8
|
1.4
|
QNAP Systems, Inc. |
CWE ids for CVE-2023-39301
-
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.Assigned by: security@qnapsecurity.com.tw (Primary)
References for CVE-2023-39301
-
https://www.qnap.com/en/security-advisory/qsa-23-51
Vulnerability in QTS, QuTS hero, and QuTScloud - Security Advisory | QNAPVendor Advisory
Jump to