Show plain JSON{"containers": {"cna": {"affected": [{"platforms": ["QTS 4.5.x"], "product": "Proxy Server", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "1.4.2 ( 2021/12/30 )", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"platforms": ["QuTS hero h5.0.0"], "product": "Proxy Server", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "1.4.3 ( 2022/01/18 )", "status": "affected", "version": "unspecified", "versionType": "custom"}]}, {"platforms": ["QuTScloud c4.5.6"], "product": "Proxy Server", "vendor": "QNAP Systems Inc.", "versions": [{"lessThan": "1.4.2 ( 2021/12/30 )", "status": "affected", "version": "unspecified", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Tony Martin, a security researcher"}], "datePublic": "2022-05-26T00:00:00", "descriptions": [{"lang": "en", "value": "A cross-site request forgery (CSRF) vulnerability has been reported to affect QNAP device running Proxy Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later QuTS hero h5.0.0: Proxy Server 1.4.3 ( 2022/01/18 ) and later QuTScloud c4.5.6: Proxy Server 1.4.2 ( 2021/12/30 ) and later"}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-352", "description": "CWE-352", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-05-26T07:20:09", "orgId": "2fd009eb-170a-4625-932b-17a53af1051f", "shortName": "qnap"}, "references": [{"tags": ["x_refsource_MISC"], "url": "https://www.qnap.com/en/security-advisory/qsa-22-18"}], "solutions": [{"lang": "en", "value": "We have already fixed this vulnerability in the following versions of Proxy Server:\nQTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later\nQuTS hero h5.0.0: Proxy Server 1.4.3 ( 2022/01/18 ) and later\nQuTScloud c4.5.6: Proxy Server 1.4.2 ( 2021/12/30 ) and later"}], "source": {"advisory": "QSA-22-18", "discovery": "EXTERNAL"}, "title": "CSRF Bypass in Proxy Server", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security@qnap.com", "DATE_PUBLIC": "2022-05-26T14:43:00.000Z", "ID": "CVE-2021-34360", "STATE": "PUBLIC", "TITLE": "CSRF Bypass in Proxy Server"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Proxy Server", "version": {"version_data": [{"platform": "QTS 4.5.x", "version_affected": "<", "version_begin": "1.4.*", "version_value": "1.4.2 ( 2021/12/30 )"}, {"platform": "QuTS hero h5.0.0", "version_affected": "<", "version_begin": "1.4.*", "version_value": "1.4.3 ( 2022/01/18 )"}, {"platform": "QuTScloud c4.5.6", "version_affected": "<", "version_begin": "1.4.*", "version_value": "1.4.2 ( 2021/12/30 )"}]}}]}, "vendor_name": "QNAP Systems Inc."}]}}, "credit": [{"lang": "eng", "value": "Tony Martin, a security researcher"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "A cross-site request forgery (CSRF) vulnerability has been reported to affect QNAP device running Proxy Server. If exploited, this vulnerability allows remote attackers to inject malicious code. We have already fixed this vulnerability in the following versions of Proxy Server: QTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later QuTS hero h5.0.0: Proxy Server 1.4.3 ( 2022/01/18 ) and later QuTScloud c4.5.6: Proxy Server 1.4.2 ( 2021/12/30 ) and later"}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-352"}]}]}, "references": {"reference_data": [{"name": "https://www.qnap.com/en/security-advisory/qsa-22-18", "refsource": "MISC", "url": "https://www.qnap.com/en/security-advisory/qsa-22-18"}]}, "solution": [{"lang": "en", "value": "We have already fixed this vulnerability in the following versions of Proxy Server:\nQTS 4.5.x: Proxy Server 1.4.2 ( 2021/12/30 ) and later\nQuTS hero h5.0.0: Proxy Server 1.4.3 ( 2022/01/18 ) and later\nQuTScloud c4.5.6: Proxy Server 1.4.2 ( 2021/12/30 ) and later"}], "source": {"advisory": "QSA-22-18", "discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-04T00:12:50.223Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://www.qnap.com/en/security-advisory/qsa-22-18"}]}]}, "cveMetadata": {"assignerOrgId": "2fd009eb-170a-4625-932b-17a53af1051f", "assignerShortName": "qnap", "cveId": "CVE-2021-34360", "datePublished": "2022-05-26T07:20:10.040731Z", "dateReserved": "2021-06-08T00:00:00", "dateUpdated": "2024-09-16T19:56:08.910Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}