First published: Sun Mar 31 2019(Updated: )
Information exposure vulnerability in /usr/syno/etc/mount.conf in Synology DiskStation Manager (DSM) before 6.2.1-23824 allows remote authenticated users to obtain sensitive information via the world readable configuration.
Credit: security@synology.com security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology DiskStation Manager | >=5.2<6.2.1-23824 | |
Synology DiskStation Manager | >=5.2<6.2.1-23824 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-13291 is classified as a high severity vulnerability due to the risk of sensitive information exposure.
To fix CVE-2018-13291, upgrade Synology DiskStation Manager to version 6.2.1-23824 or later.
CVE-2018-13291 affects all Synology DiskStation Manager versions prior to 6.2.1-23824.
CVE-2018-13291 is an information exposure vulnerability that allows remote authenticated users to access sensitive configurations.
The consequences of CVE-2018-13291 include the potential unauthorized disclosure of sensitive information contained in mount.conf.