Vulnerability Details : CVE-2013-6955
Public exploit exists!
webman/imageSelector.cgi in Synology DiskStation Manager (DSM) 4.0 before 4.0-2259, 4.2 before 4.2-3243, and 4.3 before 4.3-3810 Update 1 allows remote attackers to append data to arbitrary files, and consequently execute arbitrary code, via a pathname in the SLICEUPLOAD X-TMP-FILE HTTP header.
Vulnerability category: Execute code
Exploit prediction scoring system (EPSS) score for CVE-2013-6955
Probability of exploitation activity in the next 30 days: 97.30%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 100 % EPSS Score History EPSS FAQ
Metasploit modules for CVE-2013-6955
-
Synology DiskStation Manager SLICEUPLOAD Remote Command Execution
Disclosure Date: 2013-10-31First seen: 2020-04-26exploit/linux/http/synology_dsm_sliceupload_exec_noauthThis module exploits a vulnerability found in Synology DiskStation Manager (DSM) versions 4.x, which allows the execution of arbitrary commands under root privileges. The vulnerability is located in /webman/imageSelector.cgi, which allows to append arbitrary
CVSS scores for CVE-2013-6955
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2013-6955
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6955
-
http://www.kb.cert.org/vuls/id/615910
VU#615910 - Synology DiskStation Manager arbitrary file modificationUS Government Resource
Products affected by CVE-2013-6955
- cpe:2.3:a:synology:diskstation_manager:4.3:*:*:*:*:*:*:*
- cpe:2.3:a:synology:diskstation_manager:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:synology:diskstation_manager:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:synology:diskstation_manager:4.3-3810:*:*:*:*:*:*:*