Synology-SA-18:33 DSM
Publish Time: 2018-06-25 11:15:51 UTC+8
Last Updated: 2019-04-01 08:43:21 UTC+8
- Severity
- Important
- Status
- Resolved
Abstract
Multiple vulnerabilities allow remote authenticated users to execute arbitrary OS commands or obtain sensitive information via a susceptible version of Synology Diskstation Manager (DSM).
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
DSM 6.2 | Important | Upgrade to 6.2-23739-1 or above. |
DSM 6.1 | Important | Upgrade to 6.1.7-15284-1 or above. |
DSM 6.0 | Important | Upgrade to 6.0.3-8754-8 or above. |
DSM 5.2 | Important | Upgrade to 5.2-5967-8 or above. |
Mitigation
None
Detail
CVE-2018-13284
- Severity: Important
- CVSS3 Base Score: 7.5
- CVSS3 Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Command injection vulnerability in ftpd in Synology Diskstation Manager (DSM) before 6.2-23739-1 allows remote authenticated users to execute arbitrary OS commands via the (1) MKD or (2) RMD command.
CVE-2018-13286
- Severity: Moderate
- CVSS3 Base Score: 6.5
- CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
- Incorrect default permissions vulnerability in synouser.conf in Synology Diskstation Manager (DSM) before 6.2-23739-1 allows remote authenticated users to obtain sensitive information via the world readable configuration.
Acknowledgement
freetsubasa (https://twitter.com/freetsubasa)
Revision
Revision | Date | Description |
---|---|---|
1 | 2018-06-25 | Initial public release. |
2 | 2019-04-01 | Disclosed vulnerability details. |