Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.170133
Category:General
Title:QNAP QuTScloud RCE Vulnerability (QSA-22-20)
Summary:QNAP QuTScloud is prone to a remote code execution; (RCE) vulnerability.
Description:Summary:
QNAP QuTScloud is prone to a remote code execution
(RCE) vulnerability.

Vulnerability Insight:
A vulnerability has been reported to affect PHP versions 7.1.x
below 7.1.33, 7.2.x below 7.2.24, and 7.3.x below 7.3.11 with improper nginx configuration. For the
vulnerability to be exploited, both nginx and php-fpm must be running.

While QuTScloud do not have nginx installed by default, your QNAP NAS may still be affected if you
have installed and are running nginx and php-fpm on your NAS.

Vulnerability Impact:
If exploited, the vulnerability allows attackers to gain remote
code execution.

Affected Software/OS:
QNAP QuTScloud c5.0.x.

Solution:
No known solution was made available for at least one year since
the disclosure of this vulnerability. Likely none will be provided anymore. General solution options
are to upgrade to a newer release, disable respective features, remove the product or replace the
product by another one.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-11043
Bugtraq: 20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra (Google Search)
https://seclists.org/bugtraq/2020/Jan/44
Debian Security Information: DSA-4552 (Google Search)
https://www.debian.org/security/2019/dsa-4552
Debian Security Information: DSA-4553 (Google Search)
https://www.debian.org/security/2019/dsa-4553
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/
http://seclists.org/fulldisclosure/2020/Jan/40
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html
https://github.com/neex/phuip-fpizdam
RedHat Security Advisories: RHSA-2019:3286
https://access.redhat.com/errata/RHSA-2019:3286
RedHat Security Advisories: RHSA-2019:3287
https://access.redhat.com/errata/RHSA-2019:3287
RedHat Security Advisories: RHSA-2019:3299
https://access.redhat.com/errata/RHSA-2019:3299
RedHat Security Advisories: RHSA-2019:3300
https://access.redhat.com/errata/RHSA-2019:3300
RedHat Security Advisories: RHSA-2019:3724
https://access.redhat.com/errata/RHSA-2019:3724
RedHat Security Advisories: RHSA-2019:3735
https://access.redhat.com/errata/RHSA-2019:3735
RedHat Security Advisories: RHSA-2019:3736
https://access.redhat.com/errata/RHSA-2019:3736
RedHat Security Advisories: RHSA-2020:0322
https://access.redhat.com/errata/RHSA-2020:0322
SuSE Security Announcement: openSUSE-SU-2019:2441 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html
SuSE Security Announcement: openSUSE-SU-2019:2457 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html
https://usn.ubuntu.com/4166-1/
https://usn.ubuntu.com/4166-2/
CopyrightCopyright (C) 2022 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.