Synology-SA-18:48 SRM

Publish Time: 2018-08-20 16:37:20 UTC+8

Last Updated: 2019-04-01 10:03:19 UTC+8

Severity
Moderate
Status
Resolved

Abstract

These vulnerabilities allow remote attackers or remote authenticated users to obtain sensitive information via a susceptible version of Synology Router Manager (SRM).

Affected Products

Product Severity Fixed Release Availability
SRM 1.1 Moderate Upgrade to 1.1.7-6941-2 or above.

Mitigation

None

Detail

  • CVE-2018-13290

    • Severity: Moderate
    • CVSS3 Base Score: 4.3
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
    • Information exposure vulnerability in SYNO.Core.ACL in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote authenticated users to determine the existence of files or obtain sensitive information of files via the file_path parameter.
  • CVE-2018-13289

    • Severity: Moderate
    • CVSS3 Base Score: 5.3
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
    • Information exposure vulnerability in SYNO.FolderSharing.List in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote attackers to obtain sensitive information via the (1) folder_path or (2) real_path parameter.
  • CVE-2018-13292

    • Severity: Moderate
    • CVSS3 Base Score: 4.3
    • CVSS3 Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
    • Information exposure vulnerability in /usr/syno/etc/mount.conf in Synology Router Manager (SRM) before 1.1.7-6941-2 allows remote authenticated users to obtain sensitive information via the world readable configuration.

Acknowledgement

Maximilian Tews (www.linkedin.com/in/maximilian-tews)

Revision

Revision Date Description
1 2018-08-20 Initial public release.
2 2019-04-01 Disclosed vulnerability details.