Synology DiskStation Manager 4.3-x < 4.3-3810 Update 1 Multiple Vulnerabilities

critical Nessus Plugin ID 72345

Synopsis

The remote Synology DiskStation Manager is affected by multiple vulnerabilities.

Description

According to its version number, the Synology DiskStation Manager installed on the remote host is 4.3-x equal or prior to 4.3-3810. It is, therefore, affected by the following vulnerabilities :

- A remote code execution vulnerability exists in the File Station component due to improper validation in the 'imageSelector.cgi' script of values submitted in the X-TMP-FILE header field along with the X-TYPE-NAME:
SLICEUPLOAD header field to the 'imageSelector.cgi' script. (CVE-2013-6955)

- An issue exists in the Auto Block feature that could allow IP addresses to be improperly added to the Block List.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to 4.3-3810 Update 1 or later or contact the vendor.

See Also

https://www.securityfocus.com/archive/1/531602/30/0/threaded

Plugin Details

Severity: Critical

ID: 72345

File Name: synology_dsm_4_3_3810_1.nasl

Version: 1.8

Type: remote

Family: CGI abuses

Published: 2/5/2014

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:synology:diskstation_manager

Required KB Items: www/synology_dsm

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 12/19/2013

Vulnerability Publication Date: 1/7/2014

Exploitable With

Metasploit (Synology DiskStation Manager SLICEUPLOAD Remote Command Execution)

Reference Information

CVE: CVE-2013-6955

BID: 64516

CERT: 615910