CVE-2021-32518

7.5 HIGH

📋 TL;DR

This vulnerability in QSAN Storage Manager's share_link function allows remote attackers to create symbolic links and access arbitrary files on the system. It affects QSAN Storage Manager installations before version 3.3.3. Attackers can potentially read sensitive files or escalate privileges.

💻 Affected Systems

Products:
  • QSAN Storage Manager
Versions: Versions before v3.3.3
Operating Systems: Linux-based systems running QSAN Storage Manager
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the share_link functionality specifically. Systems with Storage Manager exposed to network are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file read/write, potentially leading to credential theft, data exfiltration, or privilege escalation to root/admin access.

🟠

Likely Case

Unauthorized access to sensitive configuration files, user data, or system files that could enable further attacks or information disclosure.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only allowing access to non-critical files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Remote exploitation is possible without authentication. The vulnerability is in a specific function that handles symbolic links.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v3.3.3

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-4874-79edc-1.html

Restart Required: Yes

Instructions:

1. Download QSAN Storage Manager v3.3.3 from official vendor sources. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the Storage Manager service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Disable share_link functionality

linux

Temporarily disable or restrict access to the vulnerable share_link feature until patching can be completed.

# Check QSAN documentation for specific disable commands
# Typically involves modifying configuration files or disabling specific services

Network isolation

linux

Restrict network access to QSAN Storage Manager to trusted internal networks only.

iptables -A INPUT -p tcp --dport [QSAN_PORT] -s [TRUSTED_NETWORK] -j ACCEPT
iptables -A INPUT -p tcp --dport [QSAN_PORT] -j DROP

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted IP addresses only.
  • Monitor file access logs for unusual symbolic link creation or file access patterns.

🔍 How to Verify

Check if Vulnerable:

Check the QSAN Storage Manager version via web interface or command line. Versions before 3.3.3 are vulnerable.

Check Version:

# Check via web interface at https://[QSAN_IP]:[PORT] or check service logs for version information

Verify Fix Applied:

Verify the version shows 3.3.3 or higher after update. Test share_link functionality to ensure symbolic link attacks are prevented.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns via share_link
  • Multiple failed symbolic link creation attempts
  • Access to system files from Storage Manager logs

Network Indicators:

  • Unusual traffic patterns to share_link endpoints
  • Multiple requests attempting file path traversal

SIEM Query:

source="QSAN_Storage_Manager" AND (event="file_access" OR event="symlink_creation") AND (file_path CONTAINS "/etc/" OR file_path CONTAINS "/root/")

🔗 References

📤 Share & Export