QsanTorture in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.twcert.org.tw/tw/cp-132-4869-714a5-1.html |
History
Mon, 16 Sep 2024 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | QSAN Storage Manager - Command Injection Following via QsanTorture function | QSAN Storage Manager - Command Injection Following via QsanTorture function |
MITRE
Status: PUBLISHED
Assigner: twcert
Published: 2021-07-07T14:11:50.536223Z
Updated: 2024-09-16T17:23:48.543Z
Reserved: 2021-05-10T00:00:00
Link: CVE-2021-32513
Vulnrichment
No data.
NVD
Status : Modified
Published: 2021-07-07T14:15:10.570
Modified: 2024-11-21T06:07:10.640
Link: CVE-2021-32513
Redhat
No data.