First published: Wed Mar 19 2025(Updated: )
Improper neutralization of special elements used in an SQL command ('SQL Injection') vulnerability in the system syncing daemon in Synology Drive Server before 3.0.4-12699, 3.2.1-23280, 3.5.0-26085 and 3.5.1-26102 allows remote attackers to inject SQL commands, limited to write operations, via unspecified vectors.
Credit: security@synology.com
Affected Software | Affected Version | How to fix |
---|---|---|
Synology Drive Server | <3.0.4-12699>=3.2.1-23280<3.5.0-26085<=3.5.1-26102 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50631 has been rated with a high severity level due to its potential impact on the database integrity of affected systems.
To fix CVE-2024-50631, update Synology Drive Server to version 3.0.4-12699, 3.2.1-23280, 3.5.0-26085, or 3.5.1-26102 or later.
CVE-2024-50631 can be exploited through SQL injection attacks that allow remote attackers to inject SQL commands for write operations.
CVE-2024-50631 affects Synology Drive Server versions earlier than 3.0.4-12699, between 3.2.1-23280 and 3.5.0-26085, and 3.5.1-26102 and earlier.
The impact of CVE-2024-50631 on data security includes potential unauthorized modifications to database records due to SQL command injection.