By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TrendSnapNewsTrendSnapNews
  • Home
Reading: QNAP QTS zero-day in Share feature gets public RCE exploit
Share
Notification Show More
TrendSnapNewsTrendSnapNews
  • Home
Follow US
© 2024 All Rights Reserved |Powered By TrendSnapNews
TrendSnapNews > Uncategorized > QNAP QTS zero-day in Share feature gets public RCE exploit
Uncategorized

QNAP QTS zero-day in Share feature gets public RCE exploit

May 26, 2024 5 Min Read
Share
QNAP QTS zero-day in Share feature gets public RCE exploit
SHARE

QNAP QTS zero-day in Share feature gets public RCE exploit

Contents
The QTS vulnerabilitiesPoC for zero-day RCE

An extensive security audit of QNAP QTS, the operating system for the company’s NAS products, has uncovered fifteen vulnerabilities of varying severity, with eleven remaining unfixed.

Among them is CVE-2024-27130, an unpatched stack buffer overflow vulnerability in the ‘No_Support_ACL’ function of ‘share.cgi,’ which could enable an attacker to perform remote code execution when specific prerequisites are met.

The vendor responded to the vulnerability reports submitted between December 12, 2023, and January 23, 2024, with multiple delays and has fixed only four of the fifteen flaws.

The vulnerabilities were discovered by WatchTowr Labs, who published the complete details of their findings and a proof of concept (PoC) exploit for CVE-2024-27130 on Friday.

The QTS vulnerabilities

The flaws uncovered by WatchTowr analysts are primarily related to code execution, buffer overflows, memory corruption, authentication bypass, and XSS issues, impacting the security of Network Attached Storage (NAS) devices across different deployment environments.

WatchTowr lists a total of fifteen flaws, summarized as follows:

  • CVE-2023-50361: Unsafe use of sprintf in getQpkgDir invoked from userConfig.cgi.
  • CVE-2023-50362: Unsafe use of SQLite functions accessible via parameter addPersonalSmtp to userConfig.cgi.
  • CVE-2023-50363: Missing authentication allows two-factor authentication to be disabled for arbitrary users.
  • CVE-2023-50364: Heap overflow via long directory name when file listing is viewed by get_dirs function of privWizard.cgi.
  • CVE-2024-21902: Missing authentication allows all users to view or clear system logs and perform additional actions.
  • CVE-2024-27127: A double-free in utilRequest.cgi via the delete_share function.
  • CVE-2024-27128: Stack overflow in check_email function, reachable via the share_file and send_share_mail actions of utilRequest.cgi.
  • CVE-2024-27129: Unsafe use of strcpy in get_tree function of utilRequest.cgi.
  • CVE-2024-27130: Unsafe use of strcpy in No_Support_ACL accessible by get_file_size function of share.cgi.
  • CVE-2024-27131: Log spoofing via x-forwarded-for allows users to cause downloads to be recorded as requested from arbitrary source locations.
  • WT-2023-0050: Under extended embargo due to an unexpectedly complex issue.
  • WT-2024-0004: Stored XSS via remote syslog messages.
  • WT-2024-0005: Stored XSS via remote device discovery.
  • WT-2024-0006: Lack of rate-limiting on authentication API.
  • WT-2024-00XX: Under 90-day embargo as per VDP.
See also  Tana Mongeau Makes Allegations of Cody Ko ‘Hooking Up’ With Her When She Was 17

The above bugs impact QTS, the NAS operating system on QNAP devices, QuTScloud, the VM-optimized version of QTS, and QTS hero, a specialized version focused on high performance.

QNAP has addressed CVE-2023-50361 through CVE-2023-50364 in a security update released in April 2024, in versions QTS 5.1.6.2722 build 20240402 and later, and QuTS hero h5.1.6.2734 build 20240414 and later.

However, all the other vulnerabilities discovered by WatchTowr remain unaddressed.

PoC for zero-day RCE

The QNAP CVE-2024-27130 vulnerability is caused by the unsafe use of the ‘strcpy’ function in the No_Support_ACL function. This function is utilized by the get_file_size request in the share.cgi script, used when sharing media with external users.

An attacker can craft a malicious request with a specially crafted ‘name’ parameter, causing the buffer overflow leading to remote code execution.

To exploit CVE-2024-27130, the attacker needs a valid ‘ssid’ parameter, which is generated when a NAS user shares a file from their QNAP device.

This parameter is included in the URL of the ‘share’ link created on a device, so an attacker would be required to use some social engineering to gain access to it. However, BleepingComputer found that users sometimes share these links online, allowing them to be indexed and retrieved from a simple Google search.

Share file dialog (top) and ssid in URL (bottom)
Share file dialog (top) and ssid in URL (bottom)
Source: WatchTowr

In summary, CVE-2024-27130 isn’t straightforward to exploit, yet the SSID prerequisite can be met for determined actors.

WatchTowr published an exploit on GitHub, in which they demonstrate how to craft a payload that creates a ‘watchtowr’ account to a QNAP device and adds them to the sudoers for elevated privileges.

BleepingComputer has contacted QNAP for a statement on the disclosed flaws, but a comment wasn’t immediately available.


Update 5/21: QNAP released an emergency update for CVE-2024-27130 and four more flaws identified by WatchTowr, with QTS 5.1.7.2770 build 20240520 and later.

See also  New liquid staking protocol for the Flare blockchain launches in private beta

In a statement released today, the company attributed the patching delay to “coordination issues,” and promised to patch any reported critical and high-severity flaws in under 45 days from now on.

You Might Also Like

The King of Fighters 15 – Vice and Mature Announced for December 2024

Lego Hill Climb Adventures is a charming, simplified Trials

France National Assembly’s reelected speaker Braun-Pivet to cohabit with New Popular Front

DeFi Protocol Rho Markets Suffers $7.6 Million Loss Scare With Gray Hat Hackers

US Calls on Chinese Regime to End Its 25-Year Persecution of Falun Gong

Share This Article
Facebook Twitter Copy Link
Previous Article XDefiant Review – Xtraordinarly Lacking XDefiant Review – Xtraordinarly Lacking
Next Article On His 73rd Birthday, Leon Schuster Speaks Out On His 73rd Birthday, Leon Schuster Speaks Out
Leave a comment Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest News

The King of Fighters 15 – Vice and Mature Announced for December 2024
The King of Fighters 15 – Vice and Mature Announced for December 2024
Uncategorized
Lego Hill Climb Adventures is a charming, simplified Trials
Lego Hill Climb Adventures is a charming, simplified Trials
Uncategorized
France National Assembly’s reelected speaker Braun-Pivet to cohabit with New Popular Front
France National Assembly’s reelected speaker Braun-Pivet to cohabit with New Popular Front
Uncategorized
DeFi Protocol Rho Markets Suffers .6 Million Loss Scare With Gray Hat Hackers
DeFi Protocol Rho Markets Suffers $7.6 Million Loss Scare With Gray Hat Hackers
Uncategorized
US Calls on Chinese Regime to End Its 25-Year Persecution of Falun Gong
US Calls on Chinese Regime to End Its 25-Year Persecution of Falun Gong
Uncategorized
The AI boom has an unlikely early winner: Wonky consultants
The AI boom has an unlikely early winner: Wonky consultants
Uncategorized

You Might Also Like

The King of Fighters 15 – Vice and Mature Announced for December 2024
Uncategorized

The King of Fighters 15 – Vice and Mature Announced for December 2024

July 20, 2024
Lego Hill Climb Adventures is a charming, simplified Trials
Uncategorized

Lego Hill Climb Adventures is a charming, simplified Trials

July 20, 2024
France National Assembly’s reelected speaker Braun-Pivet to cohabit with New Popular Front
Uncategorized

France National Assembly’s reelected speaker Braun-Pivet to cohabit with New Popular Front

July 20, 2024
DeFi Protocol Rho Markets Suffers .6 Million Loss Scare With Gray Hat Hackers
Uncategorized

DeFi Protocol Rho Markets Suffers $7.6 Million Loss Scare With Gray Hat Hackers

July 20, 2024

About Us

Welcome to TrendSnapNews, your go-to destination for the latest updates and insightful analysis on the world’s most pressing topics. At TrendSnapNews, we are committed to delivering accurate, timely, and engaging news that keeps you informed and empowered in an ever-changing world.

Legal Pages

  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service

Trending News

Helicopter carrying Iran's president apparently crashes in mountainous region

Helicopter carrying Iran's president apparently crashes in mountainous region

Para rowing – Paralympic power

Para rowing – Paralympic power

‘Portal’ installations in NYC, Dublin temporarily closed due to 'inappropriate behavior'

‘Portal’ installations in NYC, Dublin temporarily closed due to 'inappropriate behavior'

Helicopter carrying Iran's president apparently crashes in mountainous region
Helicopter carrying Iran's president apparently crashes in mountainous region
May 26, 2024
Para rowing – Paralympic power
Para rowing – Paralympic power
May 26, 2024
‘Portal’ installations in NYC, Dublin temporarily closed due to 'inappropriate behavior'
‘Portal’ installations in NYC, Dublin temporarily closed due to 'inappropriate behavior'
May 26, 2024
Stunning meteor lights up the sky over Europe
Stunning meteor lights up the sky over Europe
May 26, 2024
© 2024 All Rights Reserved |Powered By TrendSnapNews
trendsnapnews
Welcome Back!

Sign in to your account

Lost your password?