Synology Photo Station before 6.3-2958 allows remote authenticated guest users to execute arbitrary commands via shell metacharacters in the X-Forwarded-For HTTP header to photo/login.php.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2016/q1/236 | Exploit Mailing List Third Party Advisory |
https://www.synology.com/en-us/releaseNote/PhotoStation | Release Notes |
http://seclists.org/oss-sec/2016/q1/236 | Exploit Mailing List Third Party Advisory |
https://www.synology.com/en-us/releaseNote/PhotoStation | Release Notes |
Configurations
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/oss-sec/2016/q1/236 - Exploit, Mailing List, Third Party Advisory | |
References | () https://www.synology.com/en-us/releaseNote/PhotoStation - Release Notes |
Information
Published : 2017-04-10 18:59
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10322
Mitre link : CVE-2016-10322
CVE.ORG link : CVE-2016-10322
JSON object : View
Products Affected
synology
- photo_station
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')