First published: Wed Oct 31 2018(Updated: )
Information exposure vulnerability in SYNO.Core.ACL in Synology DiskStation Manager (DSM) before 6.2-23739-2 allows remote authenticated users to determine the existence and obtain the metadata of arbitrary files via the file_path parameter.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology DiskStation Manager | >=6.1<6.1.7-15284-2 | |
Synology DiskStation Manager | >=6.2<6.2-23739-2 | |
Synology DiskStation Manager | =5.2 | |
Synology DiskStation Manager | =6.0 | |
Synology Skynas | ||
Synology Vs960hd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13281 is an information exposure vulnerability in the SYNO.Core.ACL component of Synology DiskStation Manager (DSM) prior to version 6.2-23739-2.
CVE-2018-13281 allows remote authenticated users to determine the existence and obtain the metadata of arbitrary files via the file_path parameter.
The severity of CVE-2018-13281 is medium with a CVSS score of 4.3.
Synology DiskStation Manager versions prior to 6.2-23739-2 and 6.1.7-15284-2 are affected by CVE-2018-13281.
To fix CVE-2018-13281, upgrade your Synology DiskStation Manager to version 6.2-23739-2 or later.