Synology-SA-20:27 DNS Server
Publish Time: 2020-12-08 14:29:55 UTC+8
Last Updated: 2022-07-28 13:38:42 UTC+8
- Severity
- Important
- Status
- Resolved
Abstract
A vulnerability allows remote authenticated users to delete arbitrary files via a susceptible version of DNS Server.
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
DNS Server for DSM 6.2 | Important | Upgrade to 2.2.2-5027 or above. |
Mitigation
None
Detail
- CVE-2022-27615
- Severity: Important
- CVSS3 Base Score: 7.7
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
- Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology DNS Server before 2.2.2-5027 allows remote authenticated users to delete arbitrary files via unspecified vectors.
Acknowledgement
Qian Chen (@cq674350529) from Codesafe Team of Legendsec at Qi'anxin Group
Revision
Revision | Date | Description |
---|---|---|
1 | 2020-12-08 | Initial public release. |
2 | 2022-07-28 | Disclosed vulnerability details. |