QsanTorture in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-19359 | QsanTorture in QSAN Storage Manager does not filter special parameters properly that allows remote unauthenticated attackers to inject and execute arbitrary commands. The referred vulnerability has been solved with the updated version of QSAN Storage Manager v3.3.3. |
Fixes
Solution
QSAN Storage Manager v3.3.3
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.twcert.org.tw/tw/cp-132-4869-714a5-1.html |
|
History
Mon, 16 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | QSAN Storage Manager - Command Injection Following via QsanTorture function | QSAN Storage Manager - Command Injection Following via QsanTorture function |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: twcert
Published:
Updated: 2024-09-16T17:23:48.543Z
Reserved: 2021-05-10T00:00:00
Link: CVE-2021-32513
No data.
Status : Modified
Published: 2021-07-07T14:15:10.570
Modified: 2024-11-21T06:07:10.640
Link: CVE-2021-32513
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD