Synology-SA-21:11 Download Station
Publish Time: 2021-03-09 08:28:24 UTC+8
Last Updated: 2021-06-19 11:15:17 UTC+8
- Severity
- Important
- Status
- Resolved
Abstract
A vulnerability allows remote authenticated users to execute arbitrary code via a susceptible version of Download Station.
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
Download Station | Important | Upgrade to 3.8.16-3566 or above. |
Mitigation
None
Detail
CVE-2021-34809
- Severity: Important
- CVSS3 Base Score: 9.9
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Improper neutralization of special elements used in a command ('Command Injection') vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34810
- Severity: Important
- CVSS3 Base Score: 9.9
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
- Improper privilege management vulnerability in cgi component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors.
CVE-2021-34811
- Severity: Moderate
- CVSS3 Base Score: 5.0
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
- Server-Side Request Forgery (SSRF) vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to access intranet resources via unspecified vectors.
Acknowledgement
DVECORE
Reference
Revision
Revision | Date | Description |
---|---|---|
1 | 2021-03-09 | Initial public release. |
2 | 2021-06-19 | Disclosed vulnerability details. |