Информационная безопасность
[RU] switch to English


Выполнение кода в Synology DiskStation Manager
Опубликовано:27 марта 2014 г.
Источник:
SecurityVulns ID:13644
Тип:удаленная
Уровень опасности:
5/10
Описание:Выполнение кода через веб-интерфейс.
Затронутые продукты:SYNOLOGY : Synology DiskStation Manager 4.3
CVE:CVE-2013-6987 (Multiple directory traversal vulnerabilities in the FileBrowser components in Synology DiskStation Manager (DSM) before 4.3-3810 Update 3 allow remote attackers to read, write, and delete arbitrary files via a .. (dot dot) in the (1) path parameter to file_delete.cgi or (2) folder_path parameter to file_share.cgi in webapi/FileStation/; (3) dlink parameter to fbdownload/; or unspecified parameters to (4) html5_upload.cgi, (5) file_download.cgi, (6) file_sharing.cgi, (7) file_MVCP.cgi, or (8) file_rename.cgi in webapi/FileStation/.)
 CVE-2013-6955 (webman/imageSelector.cgi in Synology DiskStation Manager (DSM) 4.0 before 4.0-2259, 4.2 before 4.2-3243, and 4.3 before 4.3-3810 Update 1 allows remote attackers to append data to arbitrary files, and consequently execute arbitrary code, via a pathname in the SLICEUPLOAD X-TMP-FILE HTTP header.)
Оригинальный текстdocumenttiamat451_(at)_gmail.com, CVE-2013-6955 Synology DSM remote code execution (27.03.2014)

О сайте | Условия использования
© SecurityVulns, 3APA3A, Владимир Дубровин
Нижний Новгород