Command injection vulnerability in login.php in Synology Photo Station before 6.5.3-3226 allows remote attackers to execute arbitrary code via shell metacharacters in the crafted 'X-Forwarded-For' header.
References
Link | Resource |
---|---|
https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 | Release Notes |
https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-02-PhotoStation-Remote-Code-Execution | Exploit Third Party Advisory |
https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-01-PhotoStation-Login-without-password | Exploit Third Party Advisory |
http://seclists.org/oss-sec/2016/q1/236 | Exploit Third Party Advisory VDB Entry |
Configurations
Information
Published : 2017-05-12 13:29
Updated : 2019-10-09 16:16
NVD link : CVE-2016-10329
Mitre link : CVE-2016-10329
JSON object : View
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
synology
- photo_station