Synology-SA-20:07 Synology Calendar
Publish Time: 2020-04-29 18:23:24 UTC+8
Last Updated: 2022-08-03 10:16:34 UTC+8
- Severity
- Moderate
- Status
- Resolved
Abstract
Multiple vulnerabilities allow remote authenticated users to download arbitrary files or hijack the authentication of administrators via a susceptible version of Synology Calendar.
Affected Products
Product | Severity | Fixed Release Availability |
---|---|---|
Synology Calendar for DSM 6.2 | Moderate | Upgrade to 2.3.4-0631 or above. |
Mitigation
None
Detail
CVE-2022-22686
- Severity: Moderate
- CVSS3 Base Score: 6.5
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
- Cross-Site Request Forgery (CSRF) vulnerability in webapi component in Synology Calendar before 2.3.4-0631 allows remote authenticated users to hijack the authentication of administrators via unspecified vectors.
CVE-2022-27617
- Severity: Moderate
- CVSS3 Base Score: 5.0
- CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
- Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology Calendar before 2.3.4-0631 allows remote authenticated users to download arbitrary files via unspecified vectors.
Acknowledgement
Qian Chen (@cq674350529) from Codesafe Team of Legendsec at Qi'anxin Group
Revision
Revision | Date | Description |
---|---|---|
1 | 2020-04-29 | Initial public release. |
2 | 2022-07-26 | Disclosed vulnerability details. |
3 | 2022-08-03 | Disclosed vulnerability details. |