Synology-SA-18:33 DSM

Publish Time: 2018-06-25 11:15:51 UTC+8

Last Updated: 2019-04-01 00:43:21 UTC+8

Severity
Important
Status
Resolved

Abstract

Multiple vulnerabilities allow remote authenticated users to execute arbitrary OS commands or obtain sensitive information via a susceptible version of Synology Diskstation Manager (DSM).

Affected Products

Product Severity Fixed Release Availability
DSM 6.2 Important Upgrade to 6.2-23739-1 or above.
DSM 6.1 Important Upgrade to 6.1.7-15284-1 or above.
DSM 6.0 Important Upgrade to 6.0.3-8754-8 or above.
DSM 5.2 Important Upgrade to 5.2-5967-8 or above.

Mitigation

None

Detail

  • CVE-2018-13284

    • Severity: Important
    • CVSS3 Base Score: 7.5
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
    • Command injection vulnerability in ftpd in Synology Diskstation Manager (DSM) before 6.2-23739-1 allows remote authenticated users to execute arbitrary OS commands via the (1) MKD or (2) RMD command.
  • CVE-2018-13286

    • Severity: Moderate
    • CVSS3 Base Score: 6.5
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
    • Incorrect default permissions vulnerability in synouser.conf in Synology Diskstation Manager (DSM) before 6.2-23739-1 allows remote authenticated users to obtain sensitive information via the world readable configuration.

Acknowledgement

freetsubasa (https://twitter.com/freetsubasa)

Revision

Revision Date Description
1 2018-06-25 Initial public release.
2 2019-04-01 Disclosed vulnerability details.