CVE-2022-42785 Multiple W&T products of the ComServer Series are prone to an authentication bypass

CVE-2022-42785 Multiple W&T products of the ComServer Series are prone to an authentication bypass

The web server is not checking the validity of the request, it is only verifying if the password matches. This issue can be exploited to gain unauthorised access to the system.

How to exploit this issue? - Remote attackers can access a vulnerable system by sending a crafted request, for example, a user may send an HTTP request with a crafted ‘Location’ header. An unauthenticated remote attacker can exploit this vulnerability, to log in to the system and access data. - In order to exploit this vulnerability, user needs to send a request with a crafted 'location' header. An attacker can send a request with a crafted 'location' header, for example, an HTTP request with a crafted 'Location' header. An unauthenticated remote attacker can exploit this vulnerability, to get system access. - In order to exploit this vulnerability, user needs to send a request with a crafted 'location' header. An attacker can send a request with a crafted 'Location' header, for example, an HTTP request with a crafted 'Location' header. An unauthenticated remote attacker can exploit this vulnerability, to get system access. - In order to exploit this vulnerability, user needs to send a request with a crafted 'location' header. An attacker can send a request with a crafted 'Location' header, for example, an HTTP request with a crafted 'Location' header. An unauthenticated remote attacker can exploit this vulnerability, to get system access. - In order

Discussions

This CVE is related to password verification. This issue can be exploited by remote attackers to gain unauthorised access to the system.
The attacker sends a request with a crafted 'Location' header, like an HTTP request with a malicious 'location' header. An unauthenticated remote attacker can exploit this vulnerability, to get system access.

Vulnerable firmware versions##

- QNAP TS-853: v1.0 to v1.4
- QNAP TS-863: v1.0 to v1.7
- Synology DS1513+: v6.2 to v7.2

References

Subscribe to CVE.news
Don’t miss out on the latest issues. Sign up now to get access to the library of members-only issues.
jamie@example.com
Subscribe