Command injection vulnerability in login.php in Synology Photo Station before 6.5.3-3226 allows remote attackers to execute arbitrary code via shell metacharacters in the crafted 'X-Forwarded-For' header.
References
Link | Resource |
---|---|
http://seclists.org/oss-sec/2016/q1/236 | Exploit Third Party Advisory VDB Entry |
https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-01-PhotoStation-Login-without-password | Exploit Third Party Advisory |
https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-02-PhotoStation-Remote-Code-Execution | Exploit Third Party Advisory |
https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 | Release Notes |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: synology
Published: 2017-05-12T20:00:00
Updated: 2017-05-12T19:57:01
Reserved: 2017-04-18T00:00:00
Link: CVE-2016-10329
JSON object: View
NVD Information
Status : Modified
Published: 2017-05-12T20:29:00.203
Modified: 2019-10-09T23:16:36.747
Link: CVE-2016-10329
JSON object: View
Redhat Information
No data.
CWE