CVE-2023-23354

7.3 HIGH

📋 TL;DR

This cross-site scripting (XSS) vulnerability in QNAP's QuLog Center allows remote attackers with user access to inject malicious scripts that could bypass security mechanisms or access sensitive application data. It affects multiple QNAP operating system versions running vulnerable QuLog Center software. The vulnerability requires attacker access but can lead to privilege escalation or data theft.

💻 Affected Systems

Products:
  • QNAP QuLog Center
Versions: Versions prior to QuLog Center 1.5.0.738 (released 2023/03/06), 1.4.1.691 (released 2023/03/01), and 1.3.1.645 (released 2023/02/22)
Operating Systems: QNAP QTS, QNAP QuTS hero
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects QuLog Center specifically, which is a logging application that may be installed on various QNAP NAS devices. Attackers need user-level access to exploit this vulnerability.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An authenticated attacker could execute arbitrary JavaScript in the context of other users, potentially stealing session tokens, performing actions as other users, or accessing sensitive log data and system information.

🟠

Likely Case

An attacker with user-level access could perform session hijacking, steal authentication cookies, or manipulate the QuLog Center interface to access unauthorized data.

🟢

If Mitigated

With proper input validation and output encoding, the XSS payloads would be neutralized, preventing script execution and maintaining the integrity of the QuLog Center application.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

XSS vulnerabilities typically have low exploitation complexity once the attack vector is identified. The requirement for user authentication adds a barrier but doesn't significantly increase complexity for determined attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: QuLog Center 1.5.0.738, 1.4.1.691, or 1.3.1.645 depending on your version track

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-23-13

Restart Required: Yes

Instructions:

1. Log into your QNAP NAS web interface. 2. Navigate to App Center. 3. Check for updates to QuLog Center. 4. Update to version 1.5.0.738 or later (or the appropriate version for your track). 5. Restart the QuLog Center service or the entire NAS if prompted.

🔧 Temporary Workarounds

Disable QuLog Center

linux

Temporarily disable the QuLog Center application if immediate patching isn't possible

ssh admin@qnap-nas-ip
sudo /etc/init.d/qu_log_center.sh stop

Restrict Access

all

Limit QuLog Center access to trusted IP addresses only through firewall rules

🧯 If You Can't Patch

  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact
  • Enable HTTP-only and secure flags on all cookies to reduce session theft risk

🔍 How to Verify

Check if Vulnerable:

Check QuLog Center version in App Center or via SSH: grep -i version /usr/local/qu_log_center/package.conf

Check Version:

grep -i version /usr/local/qu_log_center/package.conf

Verify Fix Applied:

Verify QuLog Center version is 1.5.0.738 or higher (or the appropriate patched version for your track)

📡 Detection & Monitoring

Log Indicators:

  • Unusual JavaScript payloads in web server logs
  • Multiple failed authentication attempts followed by successful login
  • Suspicious user agent strings containing script tags

Network Indicators:

  • HTTP requests containing script tags or JavaScript in parameters
  • Unusual outbound connections from the NAS after QuLog Center access

SIEM Query:

source="qnap_nas" AND (http_uri="*<script*" OR http_uri="*javascript:*" OR http_user_agent="*<script*")

🔗 References

📤 Share & Export