Synology-SA-20:27 DNS Server

Publish Time: 2020-12-08 14:29:55 UTC+8

Last Updated: 2022-07-28 13:38:42 UTC+8

Severity
Important
Status
Resolved

Abstract

A vulnerability allows remote authenticated users to delete arbitrary files via a susceptible version of DNS Server.

Affected Products

Product Severity Fixed Release Availability
DNS Server for DSM 6.2 Important Upgrade to 2.2.2-5027 or above.

Mitigation

None

Detail

  • CVE-2022-27615
    • Severity: Important
    • CVSS3 Base Score: 7.7
    • CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
    • Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology DNS Server before 2.2.2-5027 allows remote authenticated users to delete arbitrary files via unspecified vectors.

Acknowledgement

Qian Chen (@cq674350529) from Codesafe Team of Legendsec at Qi'anxin Group

Revision

Revision Date Description
1 2020-12-08 Initial public release.
2 2022-07-28 Disclosed vulnerability details.