Synology-SA-18:48 SRM
Publish Time: 2018-08-20 16:37:20 UTC+8
Last Updated: 2019-04-01 10:03:19 UTC+8
- Severity
- Moderate
- Status
- Resolved
Abstract
These vulnerabilities allow remote attackers or remote authenticated users to obtain sensitive information via a susceptible version of Synology Router Manager (SRM).
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
SRM 1.1 | Moderate | Upgrade to 1.1.7-6941-2 or above. |
Mitigation
None
Detail
CVE-2018-13290
- Severity: Moderate
- CVSS3 Base Score: 4.3
- CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Information exposure vulnerability in SYNO.Core.ACL in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote authenticated users to determine the existence of files or obtain sensitive information of files via the file_path parameter.
CVE-2018-13289
- Severity: Moderate
- CVSS3 Base Score: 5.3
- CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Information exposure vulnerability in SYNO.FolderSharing.List in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote attackers to obtain sensitive information via the (1) folder_path or (2) real_path parameter.
CVE-2018-13292
- Severity: Moderate
- CVSS3 Base Score: 4.3
- CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Information exposure vulnerability in /usr/syno/etc/mount.conf in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote authenticated users to obtain sensitive information via the world readable configuration.
Acknowledgement
Maximilian Tews (www.linkedin.com/in/maximilian-tews)
Revision
Revision | Date | Description |
---|---|---|
1 | 2018-08-20 | Initial public release. |
2 | 2019-04-01 | Disclosed vulnerability details. |