QNAP OS CRLF Injection Vulnerability in HTTP Headers
CVE-2024-48868 Published on December 6, 2024

QTS, QuTS hero
An improper neutralization of CRLF sequences ('CRLF Injection') vulnerability has been reported to affect several QNAP operating system versions. If exploited, the vulnerability could allow remote attackers to modify application data. We have already fixed the vulnerability in the following versions: QTS 5.1.9.2954 build 20241120 and later QTS 5.2.2.2950 build 20241114 and later QuTS hero h5.1.9.2954 build 20241120 and later QuTS hero h5.2.2.2952 build 20241116 and later

NVD

Weakness Type

What is a CRLF Injection Vulnerability?

The software uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.

CVE-2024-48868 has been classified to as a CRLF Injection vulnerability or weakness.


Products Associated with CVE-2024-48868

Want to know whenever a new CVE is published for QNAP Qts? stack.watch will email you.

 

Affected Versions

QNAP Systems Inc. QTS: QNAP Systems Inc. QuTS hero: qnap qts: qnap quts_hero:

Exploit Probability

EPSS
0.35%
Percentile
57.03%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.