Synology NAS DSM 5.2 远程代码执行漏洞

Basic Fields

SSV ID:
SSV-90809
Find Time:
2015-12-13
Submit Time:
2016-02-23
Level:
Category:
代码执行
Component:
Synology NAS DSM
(5.2)
Author:
Unknown
Submitter:
Knownsec
CVE-ID:
Add
CNNVD-ID:
Add
CNVD-ID:
Add
ZoomEye Dork:
Add

Source

Detail

Contributor Knownsec Got  0KB
Loading icon
have 0  exchange

PoC

Unavailable PoC

Reference Linking

Solutions

Temp Solutions

Unavailable Temp Solutions

Official Solution

Unavailable Official solution

Defense Solutions

Unavailable Defense Solutions

Popularity 8927
Need to bind phone before comment. Bind Now

All Comments (1)

  • 作者后面加了个Edit: Edit: At the request of the Synology security team, and to avoid some confusion in the usage of the ‘test’ account in the POC above, this attack can only be performed with a valid administrative account. This clearly affects the likelihood of this attack, however there a few things to consider in this particular case. Firstly, this is not intended functionality by the developers. Secondly, many of these devices are placed on the Internet and only accessible via 1 port (their web interface); so being able to gain a root shell via this method and bypass corporate firewalls/routers/etc is certainly interesting. 需要管理员的账户才能提权到root账户,,这不是很鸡肋么,我为何不打开ssh,然后sudo su呢?
    1F

※Any content provided by this site, only to learn the code and services, not for illegal purposes