Lucene search

K
openvasCopyright (C) 2021 Greenbone AGOPENVAS:1361412562310145778
HistoryApr 19, 2021 - 12:00 a.m.

QNAP QTS XSS Vulnerability (QSA-21-04)

2021-04-1900:00:00
Copyright (C) 2021 Greenbone AG
plugins.openvas.org
5
qnap
qts
xss
vulnerability
file station
remote attackers
inject
malicious code
vendor advisory

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

45.3%

QNAP QTS is prone to a cross-site scripting (XSS) vulnerability in
File Station.

# SPDX-FileCopyrightText: 2021 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/o:qnap:qts";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.145778");
  script_version("2023-09-27T05:05:31+0000");
  script_tag(name:"last_modification", value:"2023-09-27 05:05:31 +0000 (Wed, 27 Sep 2023)");
  script_tag(name:"creation_date", value:"2021-04-19 04:37:10 +0000 (Mon, 19 Apr 2021)");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2021-06-21 16:57:00 +0000 (Mon, 21 Jun 2021)");

  script_cve_id("CVE-2018-19942");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("QNAP QTS XSS Vulnerability (QSA-21-04)");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2021 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_qnap_nas_http_detect.nasl");
  script_mandatory_keys("qnap/nas/qts/detected");

  script_tag(name:"summary", value:"QNAP QTS is prone to a cross-site scripting (XSS) vulnerability in
  File Station.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"An XSS vulnerability has been reported to affect earlier versions
  of File Station. If exploited, this vulnerability allows remote attackers to inject malicious code.");

  script_tag(name:"solution", value:"See the referenced vendor advisory for a solution.");

  script_xref(name:"URL", value:"https://www.qnap.com/zh-tw/security-advisory/qsa-21-04");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!version = get_app_version(cpe: CPE, nofork: TRUE))
  exit(0);

build = get_kb_item("qnap/nas/qts/build");

if(version_is_less(version: version, test_version: "4.2.6")) {
  report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.2.6", fixed_build: "20210327");
  security_message(port: 0, data: report);
  exit(0);
}

if(version_is_equal(version: version, test_version: "4.2.6") &&
          (!build || version_is_less(version: build, test_version: "20210327"))) {
  report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.2.6", fixed_build: "20210327");
  security_message(port: 0, data: report);
  exit(0);
}

if(version =~ "^4\.3") {
  if(version_is_less(version: version, test_version: "4.3.3.1432")) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.3.3.1432", fixed_build: "20201006");
    security_message(port: 0, data: report);
    exit(0);
  }

  if(version_is_equal(version: version, test_version: "4.3.3.1432") &&
            (!build || version_is_less(version: build, test_version: "20201006"))) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.3.3.1432", fixed_build: "20201006");
    security_message(port: 0, data: report);
    exit(0);
  }
}

if(version =~ "^4\.3\.4") {
  if(version_is_less(version: version, test_version: "4.3.4.1463")) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.3.4.1463", fixed_build: "20201006");
    security_message(port: 0, data: report);
    exit(0);
  }

  if(version_is_equal(version: version, test_version: "4.3.4.1463") &&
            (!build || version_is_less(version: build, test_version: "20201006"))) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.3.4.1463", fixed_build: "20201006");
    security_message(port: 0, data: report);
    exit(0);
  }
}

if(version =~ "^4\.3\.[56]") {
  if(version_is_less(version: version, test_version: "4.3.6.1446")) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.3.6.1446", fixed_build: "20200929");
    security_message(port: 0, data: report);
    exit(0);
  }

  if(version_is_equal(version: version, test_version: "4.3.6.1446") &&
            (!build || version_is_less(version: build, test_version: "20200929"))) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.3.6.1446", fixed_build: "20200929");
    security_message(port: 0, data: report);
    exit(0);
  }
}

if(version =~ "^4\.5\.1") {
  if(version_is_less(version: version, test_version: "4.5.1.1456")) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.5.1.1456", fixed_build: "20201015");
    security_message(port: 0, data: report);
    exit(0);
  }

  if(version_is_equal(version: version, test_version: "4.5.1.1456") &&
            (!build || version_is_less(version: build, test_version: "20201015"))) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.5.1.1456", fixed_build: "20201015");
    security_message(port: 0, data: report);
    exit(0);
  }
}

if(version =~ "^4\.5\.2") {
  if(version_is_less(version: version, test_version: "4.5.2.1566")) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.5.2.1566", fixed_build: "20210202");
    security_message(port: 0, data: report);
    exit(0);
  }

  if(version_is_equal(version: version, test_version: "4.5.2.1566") &&
            (!build || version_is_less(version: build, test_version: "20210202"))) {
    report = report_fixed_ver(installed_version: version, installed_build: build, fixed_version: "4.5.2.1566", fixed_build: "20210202");
    security_message(port: 0, data: report);
    exit(0);
  }
}

exit(99);

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

45.3%

Related for OPENVAS:1361412562310145778