Synology-SA-18:51 DSM
Publish Time: 2018-08-29 14:14:12 UTC+8
Last Updated: 2019-12-17 15:55:48 UTC+8
- Severity
- Moderate
- Status
- Resolved
Abstract
These vulnerabilities allow remote authenticated users to obtain sensitive information or inject arbitrary web script or HTML via s susceptible version of Synology DiskStation Manager (DSM).
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
DSM 6.2 | Moderate | Upgrade to 6.2.1-23824 or above. |
DSM 6.1 | Moderate | Upgrade to 6.2.1-23824 or above. |
DSM 5.2 | Moderate | Upgrade to 6.2.1-23824 or above. |
SkyNAS | Moderate | Will not fix. |
VS960HD | Moderate | Will not fix. |
Mitigation
None
Detail
CVE-2018-13291
- Severity: Moderate
- CVSS3 Base Score: 4.3
- CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Information exposure vulnerability in /usr/syno/etc/mount.conf in Synology DiskStation Manager (DSM) before 6.2.1-23824 allows remote authenticated users to obtain sensitive information via the world readable configuration.
CVE-2018-13293
- Severity: Moderate
- CVSS3 Base Score: 5.9
- CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L
- Cross-site scripting (XSS) vulnerability in Control Panel SSO Settings in Synology DiskStation Manager (DSM) before 6.2.1-23824 allows remote authenticated users to inject arbitrary web script or HTML via the URL parameter.
Acknowledgement
Maximilian Tews (www.linkedin.com/in/maximilian-tews)
Muhammad Junaid Abdullah (https://twitter.com/snoviboy)
Revision
Revision | Date | Description |
---|---|---|
1 | 2018-08-29 | Initial public release. |
2 | 2019-04-01 | Disclosed vulnerability details. |