CVE-2016-10331

Directory traversal vulnerability in download.php in Synology Photo Station before 6.5.3-3226 allows remote attackers to read arbitrary files via a full pathname in the id parameter.
Configurations

Configuration 1 (hide)

cpe:2.3:a:synology:photo_station:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:43

Type Values Removed Values Added
References () https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-06-Local-File-Inclusion - Exploit, Third Party Advisory () https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-06-Local-File-Inclusion - Exploit, Third Party Advisory
References () https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 - Release Notes () https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 - Release Notes

Information

Published : 2017-05-12 20:29

Updated : 2024-11-21 02:43


NVD link : CVE-2016-10331

Mitre link : CVE-2016-10331

CVE.ORG link : CVE-2016-10331


JSON object : View

Products Affected

synology

  • photo_station
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')