Directory traversal vulnerability in download.php in Synology Photo Station before 6.5.3-3226 allows remote attackers to read arbitrary files via a full pathname in the id parameter.
References
Link | Resource |
---|---|
https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-06-Local-File-Inclusion | Exploit Third Party Advisory |
https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 | Release Notes |
https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-06-Local-File-Inclusion | Exploit Third Party Advisory |
https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 | Release Notes |
Configurations
History
21 Nov 2024, 02:43
Type | Values Removed | Values Added |
---|---|---|
References | () https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-06-Local-File-Inclusion - Exploit, Third Party Advisory | |
References | () https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 - Release Notes |
Information
Published : 2017-05-12 20:29
Updated : 2024-11-21 02:43
NVD link : CVE-2016-10331
Mitre link : CVE-2016-10331
CVE.ORG link : CVE-2016-10331
JSON object : View
Products Affected
synology
- photo_station
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')