Synology NAS DSM 5.2 远程代码执行漏洞

基本字段

漏洞编号:
SSV-90809
披露/发现时间:
2015-12-13
提交时间:
2016-02-23
漏洞等级:
漏洞类别:
代码执行
影响组件:
Synology NAS DSM
(5.2)
漏洞作者:
未知
提交者:
Knownsec
CVE-ID:
补充
CNNVD-ID:
补充
CNVD-ID:
补充
ZoomEye Dork:
补充

来源

漏洞详情

贡献者 Knownsec 共获得  0KB
Loading icon
共 0  兑换了

PoC

暂无 PoC

参考链接

解决方案

临时解决方案

暂无临时解决方案

官方解决方案

暂无官方解决方案

防护方案

暂无防护方案

人气 10974
评论前需绑定手机 现在绑定

全部评论 (1)

  • 作者后面加了个Edit: Edit: At the request of the Synology security team, and to avoid some confusion in the usage of the ‘test’ account in the POC above, this attack can only be performed with a valid administrative account. This clearly affects the likelihood of this attack, however there a few things to consider in this particular case. Firstly, this is not intended functionality by the developers. Secondly, many of these devices are placed on the Internet and only accessible via 1 port (their web interface); so being able to gain a root shell via this method and bypass corporate firewalls/routers/etc is certainly interesting. 需要管理员的账户才能提权到root账户,,这不是很鸡肋么,我为何不打开ssh,然后sudo su呢?
    1F

※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负