Synology DiskStation Manager 4.3-x < 4.3-3810 Update 1 Multiple Vulnerabilities

Critical Nessus Plugin ID 72345

Synopsis

The remote Synology DiskStation Manager is affected by multiple vulnerabilities.

Description

According to its version number, the Synology DiskStation Manager installed on the remote host is 4.3-x equal or prior to 4.3-3810. It is, therefore, affected by the following vulnerabilities :

- A remote code execution vulnerability exists in the File Station component due to improper validation in the 'imageSelector.cgi' script of values submitted in the X-TMP-FILE header field along with the X-TYPE-NAME:
SLICEUPLOAD header field to the 'imageSelector.cgi' script. (CVE-2013-6955)

- An issue exists in the Auto Block feature that could allow IP addresses to be improperly added to the Block List.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to 4.3-3810 Update 1 or later or contact the vendor.

See Also

https://www.securityfocus.com/archive/1/531602/30/0/threaded

Plugin Details

Severity: Critical

ID: 72345

File Name: synology_dsm_4_3_3810_1.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 2014/02/05

Updated: 2019/11/26

Dependencies: 72341

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:synology:diskstation_manager

Required KB Items: www/synology_dsm

Exploit Available: true

Exploit Ease: No exploit is required

Patch Publication Date: 2013/12/19

Vulnerability Publication Date: 2014/01/07

Exploitable With

Metasploit (Synology DiskStation Manager SLICEUPLOAD Remote Command Execution)

Reference Information

CVE: CVE-2013-6955

BID: 64516

EDB-ID: 30470

CERT: 615910