Description
QsanTorture in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
No analysis available yet.
Remediation
Vendor Solution
QSAN Storage Manager v3.3.3
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19359 | QsanTorture in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. |
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-4869-714a5-1.html |
|
History
Mon, 16 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | QSAN Storage Manager - Command Injection Following via QsanTorture function | QSAN Storage Manager - Command Injection Following via QsanTorture function |
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T17:23:48.543Z
Reserved: 2021-05-10T00:00:00.000Z
Link: CVE-2021-32513
No data.
Status : Modified
Published: 2021-07-07T14:15:10.570
Modified: 2024-11-21T06:07:10.640
Link: CVE-2021-32513
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD