CVE-2021-32516

7.5 HIGH

📋 TL;DR

CVE-2021-32516 is a path traversal vulnerability in QSAN Storage Manager's share_link function that allows remote attackers to download arbitrary files from the system. This affects organizations using vulnerable versions of QSAN Storage Manager. Attackers can potentially access sensitive system files without authentication.

💻 Affected Systems

Products:
  • QSAN Storage Manager
Versions: Versions prior to v3.3.3
Operating Systems: All platforms running QSAN Storage Manager
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations of affected versions are vulnerable. The share_link functionality appears to be a core feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through retrieval of sensitive configuration files, credentials, or system files leading to further exploitation.

🟠

Likely Case

Unauthorized access to sensitive data stored on the storage system, including user files, configuration data, and potentially credentials.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - The vulnerability allows remote exploitation without authentication, making internet-facing instances particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this to access sensitive data.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Path traversal vulnerabilities typically have low exploitation complexity. The advisory confirms remote exploitation without authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.3.3

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-4872-fcfa4-1.html

Restart Required: Yes

Instructions:

1. Download QSAN Storage Manager v3.3.3 from official QSAN sources. 2. Backup current configuration and data. 3. Stop the QSAN Storage Manager service. 4. Install the updated version. 5. Restart the service and verify functionality.

🔧 Temporary Workarounds

Network Access Restriction

linux

Restrict network access to QSAN Storage Manager to trusted networks only

Use firewall rules to limit access: iptables -A INPUT -p tcp --dport [QSAN_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [QSAN_PORT] -j DROP

Disable Share Link Feature

all

Temporarily disable the share_link functionality if not required

Check QSAN documentation for feature disablement - typically through web interface or configuration file

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate QSAN Storage Manager from untrusted networks
  • Deploy web application firewall (WAF) with path traversal protection rules

🔍 How to Verify

Check if Vulnerable:

Check QSAN Storage Manager version via web interface or command line. Versions prior to 3.3.3 are vulnerable.

Check Version:

Check web interface dashboard or use: qsan-cli --version (if CLI available)

Verify Fix Applied:

Verify version is 3.3.3 or later and test share_link functionality with path traversal attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns via share_link
  • Multiple failed path traversal attempts
  • Access to system files through share_link

Network Indicators:

  • Unusual HTTP requests with ../ sequences to share_link endpoints
  • Large file downloads from unexpected paths

SIEM Query:

source="qsan_logs" AND (uri="*../*" OR uri="*..\\*" OR file_path="*../*")

🔗 References

📤 Share & Export