First published: Wed Jul 27 2022(Updated: )
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology DiskStation Manager (DSM) before 6.2.3-25423 allows remote authenticated users to delete arbitrary files via unspecified vectors.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology DiskStation Manager | >=6.2<6.2.3-25423 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Vulnerability CVE-2022-27610 is a 'Path Traversal' vulnerability in the webapi component in Synology DiskStation Manager (DSM) before version 6.2.3-25423.
The severity of vulnerability CVE-2022-27610 is high, with a severity score of 8.1.
The vulnerability CVE-2022-27610 affects Synology DiskStation Manager (DSM) versions before 6.2.3-25423.
Vulnerability CVE-2022-27610 allows remote authenticated users to delete arbitrary files through a 'Path Traversal' attack.
Yes, Synology has released a fix for vulnerability CVE-2022-27610. It is recommended to upgrade Synology DiskStation Manager (DSM) to version 6.2.3-25423 or newer.