{"id":6167,"date":"2024-02-18T16:08:54","date_gmt":"2024-02-18T15:08:54","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=6167"},"modified":"2024-02-18T16:08:54","modified_gmt":"2024-02-18T15:08:54","slug":"qnap-ispravlja-dvije-nove-ranjivosti","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2024\/02\/18\/qnap-ispravlja-dvije-nove-ranjivosti\/","title":{"rendered":"QNAP ispravlja dvije nove ranjivosti"},"content":{"rendered":"<p><span style=\"font-size: 14pt;\">Tajvanska kompanija <em>QNAP<\/em> ispravlja dvije nove ranjivosti ubrizgavanja komandi operativnog sistema bez autentifikacije. Ranjivost\u00a0 <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=2023-47218\" target=\"_blank\" rel=\"noopener\"><em>CVE-2023-47218<\/em><\/a> je otkrivena od strane <a href=\"https:\/\/www.rapid7.com\/blog\/post\/2024\/02\/13\/cve-2023-47218-qnap-qts-and-quts-hero-unauthenticated-command-injection-fixed\/\" target=\"_blank\" rel=\"noopener\">sigurnosne kompanije <em>Rapid7<\/em><\/a>, dok je ranjivost <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-50358\" target=\"_blank\" rel=\"noopener\"><em>CVE-2023-50358<\/em><\/a> otkrivena <a href=\"https:\/\/unit42.paloaltonetworks.com\/qnap-qts-firmware-cve-2023-50358\/\" target=\"_blank\" rel=\"noopener\">od stane <em>Unit 42<\/em> kompanije <em>Palo Alto Networks<\/em><\/a> i nalaze u se razli\u010ditim verzijama operativnih sistema ugra\u0111enih u upravlja\u010dki softver (eng. <em>firmware<\/em>) popularnih <em>QNAP<\/em> ure\u0111aja za skladi\u0161tenje podatka na mre\u017ei (eng. <em>Network-attached Storage \u2013 NAS<\/em>).<\/span><\/p>\n<div id=\"attachment_6169\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-6169\" class=\"size-full wp-image-6169\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2024\/02\/QNAP-ispravlja.jpg\" alt=\"QNAP\" width=\"1024\" height=\"1024\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2024\/02\/QNAP-ispravlja.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2024\/02\/QNAP-ispravlja-300x300.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2024\/02\/QNAP-ispravlja-150x150.jpg 150w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2024\/02\/QNAP-ispravlja-768x768.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2024\/02\/QNAP-ispravlja-12x12.jpg 12w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2024\/02\/QNAP-ispravlja-80x80.jpg 80w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2024\/02\/QNAP-ispravlja-320x320.jpg 320w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-6169\" class=\"wp-caption-text\"><em>QNAP ispravlja dvije nove ranjivosti; Source: Bing Image Creator<\/em><\/p><\/div>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Sadr\u017eaj<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #ffffff;color:#ffffff\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #ffffff;color:#ffffff\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/sajberinfo.com\/en\/2024\/02\/18\/qnap-ispravlja-dvije-nove-ranjivosti\/#RANJIVOSTI\">RANJIVOSTI<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/sajberinfo.com\/en\/2024\/02\/18\/qnap-ispravlja-dvije-nove-ranjivosti\/#CVE-2023-47218\">CVE-2023-47218<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/sajberinfo.com\/en\/2024\/02\/18\/qnap-ispravlja-dvije-nove-ranjivosti\/#CVE-2023-50358\">CVE-2023-50358<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/sajberinfo.com\/en\/2024\/02\/18\/qnap-ispravlja-dvije-nove-ranjivosti\/#AZURIRANJA\">A\u017dURIRANJA<\/a><\/li><\/ul><\/nav><\/div>\n\n<h2><span class=\"ez-toc-section\" id=\"RANJIVOSTI\"><\/span><span style=\"font-size: 14pt;\"><strong>RANJIVOSTI<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\">Obije ranjivosti se nalaze u <em>quick.cgi<\/em> komponenti, ali izgleda u drugoj funkciji i prijavljene su kompaniji <em>QNAP<\/em> po\u010detkom novembra 2023. godine. Ranjivosti uti\u010du na <em>QNAP<\/em> operativne sisteme kao \u0161to su <em>QTS<\/em>, <em>QuTS<\/em> <em>Hero<\/em> i <em>QuTS<\/em> <em>Cloud<\/em>. <em>QTS<\/em> je je operativni sistem za <em>QNAP<\/em> <em>NAS<\/em> po\u010detnog i srednjeg nivoa. <em>QTS<\/em> pru\u017ea fleksibilne funkcije i aplikacije sa dodatom vredno\u0161\u0107u, kao \u0161to su snimke, <em>Plex<\/em> medijski serveri i jednostavan pristup li\u010dnom oblaku, kako bi pouzdano skladi\u0161tenje postalo dostupno svim korisnicima koji koriste <em>Linux<\/em> i <a href=\"https:\/\/sajberinfo.com\/2022\/12\/16\/sistemi-datoteka\/#Ext2Ext3Ext4\" target=\"_blank\" rel=\"nofollow noopener\"><em>ext4<\/em><\/a>.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"CVE-2023-47218\"><\/span><span style=\"font-size: 14pt;\"><strong><em>CVE-2023-47218<\/em><\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-size: 14pt;\">Ranjiva komponenta <em>quick.cgi<\/em> je izlo\u017eena administrativnom funkcijom ure\u0111aja zasnovanom na vebu, koja je prisutna u neinicijalizovanom <em>QNAP<\/em> <em>NAS<\/em> ure\u0111aju. Ova komponenta je namijenjena da se koristi tokom ru\u010dnog ili obezbje\u0111ivanja u oblaku <em>QNAP<\/em> <em>NAS<\/em> ure\u0111aja. Kada je ure\u0111aj uspje\u0161no inicijalizovan, komponenta <em>quick.cgi<\/em> je onemogu\u0107ena na sistemu.<\/span><\/p>\n<p><span style=\"font-size: 14pt;\">Napada\u010d sa pristupom mre\u017ei neinicijalizovanom <em>QNAP<\/em> <em>NAS<\/em> ure\u0111aju mo\u017ee da izvr\u0161i ubrizgavanje komande bez autentifikacije, dozvoljavaju\u0107i napada\u010du da izvr\u0161i proizvoljne komande na ure\u0111aju.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"CVE-2023-50358\"><\/span><span style=\"font-size: 14pt;\"><strong><em>CVE-2023-50358<\/em><\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><span style=\"font-size: 14pt;\">Ova ranjivost omogu\u0107ava ubacivanje komande preko <em>quick.cgi <\/em>komponente <em>QNAP QTS<\/em> upravlja\u010dkog softvera, kojoj se mo\u017ee pristupiti bez autentifikacije. Koriste\u0107i ovaj pristup, napada\u010d bi mogao da podesi parametar <em>HTTP<\/em> zahteva <em>todo=set_timeinfo<\/em>. Ova vrednost parametra je sa\u010duvana u \/tmp\/quick\/quick_tmp.conf datoteci i nije dezinfikovana. Ovu pode\u0161enu vrijednost kasnije obra\u0111uje ranjiva funkcija <em>ntp_sync_func()<\/em>. Ova funkcija poziva uslu\u017eni program <em>ntpdate utility[1]<\/em> da obradi pode\u0161enu vrijednost parametra. Ostatak niza se zatim izvr\u0161ava sa funkcijom <em>system()<\/em> koja vodi do izvr\u0161enja uba\u010dene komande na sistemu.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span class=\"ez-toc-section\" id=\"AZURIRANJA\"><\/span><strong><span style=\"font-size: 14pt;\">A\u017dURIRANJA<\/span><\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-size: 14pt;\"><em>QNAP NAS<\/em> ure\u0111aji su \u010desta meta napada zlonamjernih aktera, <a href=\"https:\/\/sajberinfo.com\/2022\/01\/26\/deadbolt-ransomware-napada-qnap-nas-uredjaje\/\" target=\"_blank\" rel=\"nofollow noopener\">posebno <em>ransomware<\/em> grupa<\/a>. Kako bi za\u0161titila korisnike, kompanija <em>QNAP<\/em> je po\u010dela da objavljuje a\u017euriranja od po\u010detkom januara 2024. godine, iako su neka od njih do\u0161la u nekoliko faza. Informativna lista pogo\u0111enih i a\u017euriranih verzija je ispod:<\/span><\/p>\n<p>&nbsp;<\/p>\n<table width=\"0\">\n<tbody>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><strong>Ranjiva verzija<\/strong><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><strong>Djelimi\u010dno a\u017eurirana verzija<\/strong><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><strong>Potpuno a\u017eurirana verzija<\/strong><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QTS 5.1.x<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QTS 5.1.0.2444 build 20230629 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QTS 5.1.5.2645 build 20240116 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QTS 5.0.1<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QTS 5.0.1.2145 build 20220903 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QTS 5.1.5.2645 build 20240116 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QTS 5.0.0<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QTS 5.0.0.1986 build 20220324 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QTS 5.1.5.2645 build 20240116 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QTS 4.5.x, 4, 4,x<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QTS 4.5.4.2012 build 20220419 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QTS 4.5.4.2627 build 20231225 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QTS 4.3.6, 4.3.5<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QTS 4.3.6.2665 build 20240131 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QTS 4.3.6.2665 build 20240131 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QTS 4.3.4<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QTS 4.3.4.2675 build 20240131 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QTS 4.3.4.2675 build 20240131 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QTS 4.3.x<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QTS 4.3.3.2644 build 20240131 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QTS 4.3.3.2644 build 20240131 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QTS 4.2.x<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QTS 4.2.6 build 20240131 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QTS 4.2.6 build 20240131 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h5.1.x<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h5.1.0.2466 build 20230721 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h5.1.5.2647 build 20240118 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h5.0.1<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h5.0.1.2192 build 20221020 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h5.1.5.2647 build 20240118 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h5.0.0<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h5.0.0.1986 build 20220324 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h5.1.5.2647 build 20240118 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h4.x<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h4.5.4.1991 build 20220330 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QuTS Hero h4.5.4.2626 build 20231225 i novije<\/em><\/span><\/td>\n<\/tr>\n<tr>\n<td width=\"116\"><span style=\"font-size: 14pt;\"><em>QuTScloud c5.x<\/em><\/span><\/td>\n<td width=\"270\"><span style=\"font-size: 14pt;\"><em>QuTScloud c5.1.5.2651 i novije<\/em><\/span><\/td>\n<td width=\"273\"><span style=\"font-size: 14pt;\"><em>QuTScloud c5.1.5.2651 i novije<\/em><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-size: 14pt;\">Administratorima se savjetuje da nadograde <em>QNAP<\/em> <em>NAS<\/em> ure\u0111aje na fiksnu verziju upravlja\u010dkog softvera (ako ve\u0107 nisu). <em>QNAP<\/em> je tako\u0111e objasnio kako mogu da provjere da li je njihov sistem ranjiv <a href=\"https:\/\/www.qnap.com\/en\/security-advisory\/qsa-23-57\" target=\"_blank\" rel=\"noopener\">ovdje<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tajvanska kompanija QNAP ispravlja dvije nove ranjivosti ubrizgavanja komandi operativnog sistema bez autentifikacije. Ranjivost\u00a0 CVE-2023-47218 je otkrivena od strane sigurnosne kompanije Rapid7, dok je ranjivost CVE-2023-50358 otkrivena od stane Unit 42 kompanije Palo Alto&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":6169,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[777,778,132,782,779,781,780],"class_list":["post-6167","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-cve-2023-47218","tag-cve-2023-50358","tag-qnap","tag-qnap-nas","tag-qts","tag-quts-cloud","tag-quts-hero"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/6167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=6167"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/6167\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/6169"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=6167"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=6167"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=6167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}