First published: Tue Dec 31 2013(Updated: )
Multiple directory traversal vulnerabilities in the FileBrowser components in Synology DiskStation Manager (DSM) before 4.3-3810 Update 3 allow remote attackers to read, write, and delete arbitrary files via a .. (dot dot) in the (1) path parameter to file_delete.cgi or (2) folder_path parameter to file_share.cgi in webapi/FileStation/; (3) dlink parameter to fbdownload/; or unspecified parameters to (4) html5_upload.cgi, (5) file_download.cgi, (6) file_sharing.cgi, (7) file_MVCP.cgi, or (8) file_rename.cgi in webapi/FileStation/.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Synology DiskStation Manager | =4.3-3810 | |
Synology DiskStation Manager | =4.3-3810 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6987 is classified as a critical vulnerability due to its potential for unauthorized file access and manipulation.
To mitigate CVE-2013-6987, upgrade Synology DiskStation Manager to version 4.3-3810 Update 3 or later.
CVE-2013-6987 can allow remote attackers to read, write, and delete arbitrary files on the affected systems.
CVE-2013-6987 affects Synology DiskStation Manager versions prior to 4.3-3810 Update 3.
CVE-2013-6987 impacts the FileBrowser components, particularly the file_delete.cgi and folder_path parameters.