CVE-2024-32769

6.3 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in QNAP Photo Station that allows remote attackers with user access to inject malicious scripts. It affects users running vulnerable versions of Photo Station, potentially leading to session hijacking or data theft.

💻 Affected Systems

Products:
  • QNAP Photo Station
Versions: Versions prior to 6.4.3
Operating Systems: QNAP QTS and QuTS hero operating systems
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems where Photo Station is enabled; users must have access to exploit, but default configurations may be vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal user sessions, redirect to malicious sites, or perform actions on behalf of authenticated users, compromising data integrity and confidentiality.

🟠

Likely Case

Attackers exploit the vulnerability to inject scripts that steal session cookies or credentials, leading to unauthorized access to user accounts.

🟢

If Mitigated

With proper input validation and output encoding, the risk is minimized, but patching is essential to fully mitigate.

🌐 Internet-Facing: HIGH, as remote attackers can exploit it if the service is exposed to the internet, increasing attack surface.
🏢 Internal Only: MEDIUM, as exploitation requires user access, but internal threats or compromised accounts could still leverage it.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user access, making it straightforward for attackers with credentials or compromised accounts.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Photo Station 6.4.3 (2024/07/12) and later

Vendor Advisory: https://www.qnap.com/en/security-advisory/qsa-24-39

Restart Required: Yes

Instructions:

1. Log into QNAP NAS as administrator. 2. Open App Center. 3. Check for updates to Photo Station. 4. Install version 6.4.3 or later. 5. Restart the Photo Station service or NAS if prompted.

🔧 Temporary Workarounds

Disable Photo Station

all

Temporarily disable the Photo Station application to prevent exploitation until patching.

Log into QNAP NAS, go to App Center, select Photo Station, and click 'Disable'.

Restrict Access

all

Limit network access to Photo Station using firewall rules to trusted IPs only.

Configure firewall on QNAP NAS to allow access only from specific IP ranges.

🧯 If You Can't Patch

  • Implement strict input validation and output encoding in custom configurations to reduce XSS risk.
  • Monitor and audit user activities for suspicious behavior, such as unexpected script injections.

🔍 How to Verify

Check if Vulnerable:

Check the Photo Station version in QNAP App Center; if below 6.4.3, it is vulnerable.

Check Version:

ssh into QNAP NAS and run: /sbin/getcfg PhotoStation Version -f /etc/config/qpkg.conf

Verify Fix Applied:

After updating, confirm the version is 6.4.3 or higher in App Center and test for XSS by attempting to inject scripts in user inputs.

📡 Detection & Monitoring

Log Indicators:

  • Look for unusual POST/GET requests with script tags or encoded payloads in Photo Station access logs.

Network Indicators:

  • Monitor for HTTP requests containing malicious JavaScript patterns to Photo Station endpoints.

SIEM Query:

source="photo_station_logs" AND (http_request CONTAINS "<script>" OR http_request CONTAINS "javascript:")

🔗 References

📤 Share & Export