CVE-2024-32767
📋 TL;DR
This cross-site scripting (XSS) vulnerability in QNAP Photo Station allows authenticated remote attackers to inject malicious scripts into web pages. When exploited, it could enable session hijacking, credential theft, or malware delivery to users viewing the compromised pages. Organizations running vulnerable versions of Photo Station are affected.
💻 Affected Systems
- QNAP Photo Station
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator credentials, take full control of the Photo Station application, pivot to other systems, or deploy ransomware across the network.
Likely Case
Attackers with user-level access could steal session cookies, perform actions as authenticated users, or redirect users to malicious sites.
If Mitigated
With proper network segmentation and web application firewalls, impact would be limited to the Photo Station application itself.
🎯 Exploit Status
Exploitation requires authenticated access but uses common XSS techniques
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Photo Station 6.4.3 (2024/07/12) and later
Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-24-39
Restart Required: Yes
Instructions:
1. Log into QNAP App Center 2. Check for Photo Station updates 3. Install version 6.4.3 or later 4. Restart Photo Station service
🔧 Temporary Workarounds
Disable Photo Station
allTemporarily disable Photo Station service if patching is not immediately possible
From QTS Control Panel: App Center → Photo Station → Disable
Network Isolation
allRestrict access to Photo Station to trusted internal networks only
Configure firewall rules to block external access to Photo Station ports
🧯 If You Can't Patch
- Implement strict input validation and output encoding at the web application firewall level
- Enable Content Security Policy (CSP) headers to restrict script execution
🔍 How to Verify
Check if Vulnerable:
Check Photo Station version in QNAP App Center or via SSH: cat /etc/config/uLinux.conf | grep photo_station_version
Check Version:
cat /etc/config/uLinux.conf | grep photo_station_version
Verify Fix Applied:
Confirm version is 6.4.3 or higher in App Center or via version check command
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to Photo Station endpoints
- Suspicious script tags in URL parameters or form submissions
Network Indicators:
- Multiple failed authentication attempts followed by successful login and script-like payloads
SIEM Query:
source="qnap_logs" AND (app="photo_station" AND (url="*<script*" OR param="*javascript:*"))