First published: Tue Jun 01 2021(Updated: )
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability container volume management component in Synology Docker before 18.09.0-0515 allows local users to read or write arbitrary files via unspecified vectors.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology Docker | <18.09.0-0515 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33183 is rated as a medium severity vulnerability that can lead to unauthorized file access.
To mitigate CVE-2021-33183, update your Synology Docker to version 18.09.0-0515 or later.
CVE-2021-33183 is a path traversal vulnerability affecting the container volume management component.
Local users of Synology Docker versions prior to 18.09.0-0515 are affected by CVE-2021-33183.
An attacker could exploit CVE-2021-33183 to read or write arbitrary files on the system.