安全ID : NAS-201806-01

Security Advisory for Proxy Server Vulnerabilities


  • 发布日期 : June 1, 2018

  • 通用漏洞披露 : CVE-2017-7635 | CVE-2017-7636 | CVE-2017-7637| CVE-2017-7639

  • 受影响产品: Proxy Server versions 1.2.0 and earlier

严重程度

严重

状态

已解决


Summary

Four vulnerabilities were reported on Proxy Server versions 1.2.0 and earlier. We have listed information on each vulnerability below. 

  • CVE-2017-7635: This cross-site request forgery (CSRF) vulnerability could allow attackers to force NAS users to execute unwanted actions through a web application.
  • CVE-2017-7636: This cross-site scripting (XSS) vulnerability could allow remote attackers to inject Javascript code in the application.
  • CVE-2017-7637: If exploited, this vulnerability could allow remote attackers to run arbitrary OS commands on the NAS.
  • CVE-2017-7639: This vulnerability does not authenticate requests properly. If exploited, it could allow attackers to change Proxy Server settings.

We have fixed these issues in Proxy Server versions 1.3.0 and later.

For x31 and x31U models, we have fixed these issues in Proxy Server versions 1.2.1 and later.

Recommendation

To resolve the issue, you must update Proxy Server to version 1.3.0 or later.

For users with x31 and x31U models, you must update Proxy Server to version 1.2.1 or later.

Upgrading to the latest Proxy Server version

  1. Log on to QTS as administrator.
  2. Open the App Center, and then click the Search icon.
    A search box appears.
  3. Type "Proxy Server", and then press ENTER.
  4. The Proxy Server application appears in the search results list.
    Click Update.
  5. A confirmation message appears.
    Click OK.
  6. The application is updated.

 

致谢: Tony Martin, information security researcher

修订历史: V1.0 (June 01, 2018) - Published

选择规格

      显示更多 隐藏更多
      open menu
      back to top