All the vulnerabilites related to Synology - Synology DiskStation Manager (DSM)
cve-2021-29083
Vulnerability from cvelistv5
Published
2021-04-01 05:20
Modified
2024-09-17 02:42
Severity ?
EPSS score ?
Summary
Improper neutralization of special elements used in an OS command in SYNO.Core.Network.PPPoE in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote authenticated users to execute arbitrary code via realname parameter.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:55:12.656Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-04-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper neutralization of special elements used in an OS command in SYNO.Core.Network.PPPoE in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote authenticated users to execute arbitrary code via realname parameter." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-01T05:20:13", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-04-01T05:14:36.718969", "ID": "CVE-2021-29083", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper neutralization of special elements used in an OS command in SYNO.Core.Network.PPPoE in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote authenticated users to execute arbitrary code via realname parameter." } ] }, "impact": { "cvss": { "baseScore": "7.2", "vectorString": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-29083", "datePublished": "2021-04-01T05:20:13.245382Z", "dateReserved": "2021-03-23T00:00:00", "dateUpdated": "2024-09-17T02:42:37.369Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26565
Vulnerability from cvelistv5
Published
2021-02-26 21:45
Modified
2024-09-17 01:27
Severity ?
EPSS score ?
Summary
Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to obtain sensitive information via an HTTP session.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to obtain sensitive information via an HTTP session." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319: Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-19T19:06:24", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-02-26T00:00:00", "ID": "CVE-2021-26565", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to obtain sensitive information via an HTTP session." } ] }, "impact": { "cvss": { "baseScore": "8.3", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319: Cleartext Transmission of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-26565", "datePublished": "2021-02-26T21:45:34.345463Z", "dateReserved": "2021-02-02T00:00:00", "dateUpdated": "2024-09-17T01:27:07.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26562
Vulnerability from cvelistv5
Published
2021-02-26 21:45
Modified
2024-09-17 04:08
Severity ?
EPSS score ?
Summary
Out-of-bounds write vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary code via syno_finder_site HTTP header.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.470Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Out-of-bounds write vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary code via syno_finder_site HTTP header." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787: Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-19T18:06:15", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-02-26T00:00:00", "ID": "CVE-2021-26562", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds write vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary code via syno_finder_site HTTP header." } ] }, "impact": { "cvss": { "baseScore": "9.0", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-787: Out-of-bounds Write" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-26562", "datePublished": "2021-02-26T21:45:31.818984Z", "dateReserved": "2021-02-02T00:00:00", "dateUpdated": "2024-09-17T04:08:58.655Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27647
Vulnerability from cvelistv5
Published
2021-03-12 06:35
Modified
2024-09-16 20:13
Severity ?
EPSS score ?
Summary
Out-of-bounds Read vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-21-339/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:10.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Out-of-bounds Read vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "CWE-125: Out-of-bounds Read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-22T16:06:11", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-03-12T06:02:06.522873", "ID": "CVE-2021-27647", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Out-of-bounds Read vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests." } ] }, "impact": { "cvss": { "baseScore": "9.8", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-125: Out-of-bounds Read" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-27647", "datePublished": "2021-03-12T06:35:11.865594Z", "dateReserved": "2021-02-24T00:00:00", "dateUpdated": "2024-09-16T20:13:32.164Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-29088
Vulnerability from cvelistv5
Published
2021-06-01 09:45
Modified
2024-09-16 20:16
Severity ?
EPSS score ?
Summary
Improper limitation of a pathname to a restricted directory ('Path Traversal') in cgi component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows local users to execute arbitrary code via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_21_03 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:55:12.619Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_21_03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.4-25553", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-05-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027) in cgi component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows local users to execute arbitrary code via unspecified vectors." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-01T09:45:20", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_21_03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-05-18T06:15:41.149855", "ID": "CVE-2021-29088", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.4-25553" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027) in cgi component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows local users to execute arbitrary code via unspecified vectors." } ] }, "impact": { "cvss": { "baseScore": "7.8", "vectorString": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_21_03", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_21_03" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-29088", "datePublished": "2021-06-01T09:45:20.782280Z", "dateReserved": "2021-03-23T00:00:00", "dateUpdated": "2024-09-16T20:16:24.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26561
Vulnerability from cvelistv5
Published
2021-02-26 21:45
Modified
2024-09-16 23:06
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary code via syno_finder_site HTTP header.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.449Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary code via syno_finder_site HTTP header." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121: Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-19T18:06:13", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-02-26T00:00:00", "ID": "CVE-2021-26561", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary code via syno_finder_site HTTP header." } ] }, "impact": { "cvss": { "baseScore": "9.0", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-121: Stack-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-26561", "datePublished": "2021-02-26T21:45:31.206502Z", "dateReserved": "2021-02-02T00:00:00", "dateUpdated": "2024-09-16T23:06:05.777Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33182
Vulnerability from cvelistv5
Published
2021-06-01 09:50
Modified
2024-09-16 19:05
Severity ?
EPSS score ?
Summary
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in PDF Viewer component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to read limited files via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_21_03 | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:42:20.223Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_21_03" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.4-25553", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-05-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027) vulnerability in PDF Viewer component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to read limited files via unspecified vectors." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-01T09:50:17", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_21_03" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-05-26T09:29:06.289650", "ID": "CVE-2021-33182", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.4-25553" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027) vulnerability in PDF Viewer component in Synology DiskStation Manager (DSM) before 6.2.4-25553 allows remote authenticated users to read limited files via unspecified vectors." } ] }, "impact": { "cvss": { "baseScore": "5.0", "vectorString": "AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_21_03", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_21_03" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-33182", "datePublished": "2021-06-01T09:50:17.599911Z", "dateReserved": "2021-05-18T00:00:00", "dateUpdated": "2024-09-16T19:05:32.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26569
Vulnerability from cvelistv5
Published
2021-03-12 06:40
Modified
2024-09-17 03:49
Severity ?
EPSS score ?
Summary
Race Condition within a Thread vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-21-338/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.555Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-338/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Race Condition within a Thread vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-366", "description": "CWE-366: Race Condition within a Thread", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-18T14:06:40", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-338/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-03-12T06:01:35.532754", "ID": "CVE-2021-26569", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race Condition within a Thread vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests." } ] }, "impact": { "cvss": { "baseScore": "9.8", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-366: Race Condition within a Thread" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-338/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-338/" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-26569", "datePublished": "2021-03-12T06:40:13.071732Z", "dateReserved": "2021-02-02T00:00:00", "dateUpdated": "2024-09-17T03:49:02.807Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26566
Vulnerability from cvelistv5
Published
2021-02-26 21:45
Modified
2024-09-17 03:23
Severity ?
EPSS score ?
Summary
Insertion of sensitive information into sent data vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary commands via inbound QuickConnect traffic.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.445Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Insertion of sensitive information into sent data vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary commands via inbound QuickConnect traffic." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-201", "description": "CWE-201: Insertion of Sensitive Information Into Sent Data", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-19T19:06:25", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-02-26T00:00:00", "ID": "CVE-2021-26566", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insertion of sensitive information into sent data vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to execute arbitrary commands via inbound QuickConnect traffic." } ] }, "impact": { "cvss": { "baseScore": "8.3", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-201: Insertion of Sensitive Information Into Sent Data" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-26566", "datePublished": "2021-02-26T21:45:35.118113Z", "dateReserved": "2021-02-02T00:00:00", "dateUpdated": "2024-09-17T03:23:15.693Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26564
Vulnerability from cvelistv5
Published
2021-02-26 21:45
Modified
2024-09-17 00:46
Severity ?
EPSS score ?
Summary
Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.479Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319: Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-12T12:50:50", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-02-26T00:00:00", "ID": "CVE-2021-26564", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information vulnerability in synorelayd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session." } ] }, "impact": { "cvss": { "baseScore": "8.3", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319: Cleartext Transmission of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1160" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-26564", "datePublished": "2021-02-26T21:45:33.663943Z", "dateReserved": "2021-02-02T00:00:00", "dateUpdated": "2024-09-17T00:46:03.051Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-15894
Vulnerability from cvelistv5
Published
2017-12-08 16:00
Modified
2024-09-16 19:31
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in the SYNO.FileStation.Extract in Synology DiskStation Manager (DSM) 6.0.x before 6.0.3-8754-3 and before 5.2-5967-6 allows remote authenticated users to write arbitrary files via the dest_folder_path parameter.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/en-global/support/security/Synology_SA_17_70_DSM | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:04:50.448Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/en-global/support/security/Synology_SA_17_70_DSM" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "status": "affected", "version": "6.0.x before 6.0.3-8754-3" }, { "status": "affected", "version": "before 5.2-5967-6" } ] } ], "datePublic": "2017-11-15T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the SYNO.FileStation.Extract in Synology DiskStation Manager (DSM) 6.0.x before 6.0.3-8754-3 and before 5.2-5967-6 allows remote authenticated users to write arbitrary files via the dest_folder_path parameter." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper Limitation of a Pathname to a Restricted Directory (CWE-22)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-08T15:57:01", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/en-global/support/security/Synology_SA_17_70_DSM" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2017-11-15T00:00:00", "ID": "CVE-2017-15894", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "version_value": "6.0.x before 6.0.3-8754-3" }, { "version_value": "before 5.2-5967-6" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in the SYNO.FileStation.Extract in Synology DiskStation Manager (DSM) 6.0.x before 6.0.3-8754-3 and before 5.2-5967-6 allows remote authenticated users to write arbitrary files via the dest_folder_path parameter." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Improper Limitation of a Pathname to a Restricted Directory (CWE-22)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/en-global/support/security/Synology_SA_17_70_DSM", "refsource": "CONFIRM", "url": "https://www.synology.com/en-global/support/security/Synology_SA_17_70_DSM" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2017-15894", "datePublished": "2017-12-08T16:00:00Z", "dateReserved": "2017-10-25T00:00:00", "dateUpdated": "2024-09-16T19:31:51.358Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-26560
Vulnerability from cvelistv5
Published
2021-02-26 21:45
Modified
2024-09-17 01:30
Severity ?
EPSS score ?
Summary
Cleartext transmission of sensitive information vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM | |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159 | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.473Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-02-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Cleartext transmission of sensitive information vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319: Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-12T12:50:50", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-02-26T00:00:00", "ID": "CVE-2021-26560", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cleartext transmission of sensitive information vulnerability in synoagentregisterd in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows man-in-the-middle attackers to spoof servers via an HTTP session." } ] }, "impact": { "cvss": { "baseScore": "9.0", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-319: Cleartext Transmission of Sensitive Information" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159", "refsource": "MISC", "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1159" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-26560", "datePublished": "2021-02-26T21:45:30.498636Z", "dateReserved": "2021-02-02T00:00:00", "dateUpdated": "2024-09-17T01:30:56.188Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-27646
Vulnerability from cvelistv5
Published
2021-03-12 06:45
Modified
2024-09-16 18:54
Severity ?
EPSS score ?
Summary
Use After Free vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests.
References
▼ | URL | Tags |
---|---|---|
https://www.synology.com/security/advisory/Synology_SA_20_26 | x_refsource_CONFIRM | |
https://www.zerodayinitiative.com/advisories/ZDI-21-340/ | x_refsource_MISC | |
https://www.zerodayinitiative.com/advisories/ZDI-21-339/ | x_refsource_MISC |
Impacted products
▼ | Vendor | Product |
---|---|---|
Synology | Synology DiskStation Manager (DSM) |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T21:26:10.663Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-340/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Synology DiskStation Manager (DSM)", "vendor": "Synology", "versions": [ { "lessThan": "6.2.3-25426-3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-03-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Use After Free vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416: Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-03-22T16:06:10", "orgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "shortName": "synology" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-340/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@synology.com", "DATE_PUBLIC": "2021-03-12T06:01:55.451382", "ID": "CVE-2021-27646", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Synology DiskStation Manager (DSM)", "version": { "version_data": [ { "affected": "\u003c", "version_affected": "\u003c", "version_value": "6.2.3-25426-3" } ] } } ] }, "vendor_name": "Synology" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Use After Free vulnerability in iscsi_snapshot_comm_core in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via crafted web requests." } ] }, "impact": { "cvss": { "baseScore": "9.8", "vectorString": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-416: Use After Free" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.synology.com/security/advisory/Synology_SA_20_26", "refsource": "CONFIRM", "url": "https://www.synology.com/security/advisory/Synology_SA_20_26" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-340/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-340/" }, { "name": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/", "refsource": "MISC", "url": "https://www.zerodayinitiative.com/advisories/ZDI-21-339/" } ] } } } }, "cveMetadata": { "assignerOrgId": "db201096-a0cc-46c7-9a55-61d9e221bf01", "assignerShortName": "synology", "cveId": "CVE-2021-27646", "datePublished": "2021-03-12T06:45:13.026370Z", "dateReserved": "2021-02-24T00:00:00", "dateUpdated": "2024-09-16T18:54:23.293Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }