Synology DiskStation Manager < 4.3-3810 Update 3 Multiple FileBrowser Component Directory Traversal Vulnerabilities

This script is Copyright (C) 2014 Tenable Network Security, Inc.

Synopsis :

The remote Synology DiskStation Manager is affected by multiple
directory traversal vulnerabilities.

Description :

According to its version number, the Synology DiskStation Manager
installed on the remote host is 4.3-x equal or prior to 4.3-3810. It
is, therefore, affected by multiple directory traversal vulnerabilities
in the FileBrowser component. The issue exists due to improper
validation of values submitted to the various file parameters in the
following scripts in the '/webapi/FileStation' directory :

- html5_upload.cgi
- file_delete.cgi
- file_download.cgi
- file_sharing.cgi
- file_share.cgi
- file_MVCP.cgi
- file_rename.cgi

Any authenticated user can exploit these affected files to read, write,
and delete arbitrary files.

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.

Solution :

Upgrade to 4.3-3810 Update 3 or later, or contact the vendor.

Risk factor :

Medium / CVSS Base Score : 6.5
CVSS Temporal Score : 5.7
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 72346 ()

Bugtraq ID: 64483

CVE ID: CVE-2013-6987

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now