First published: Fri Sep 11 2015(Updated: )
Cross-site scripting (XSS) vulnerability in the "Create download task via URL" feature in Synology Download Station before 3.5-2967 allows remote attackers to inject arbitrary web script or HTML via the urls parameter in an add_url_task action to dlm/downloadman.cgi.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Synology Download Station | <=3.5-2963 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6913 is classified as a medium severity vulnerability due to its potential for exploitation through cross-site scripting (XSS).
To mitigate CVE-2015-6913, ensure you update Synology Download Station to version 3.5-2964 or later, as these versions have addressed the vulnerability.
CVE-2015-6913 can facilitate cross-site scripting (XSS) attacks, allowing remote attackers to inject malicious scripts into web pages viewed by users.
CVE-2015-6913 affects Synology Download Station versions up to and including 3.5-2963.
The exploit vector for CVE-2015-6913 is the 'urls' parameter in the 'add_url_task' action of the 'dlm/downloadman.cgi' script.