Vulnerability Description
Information exposure vulnerability in SYNO.Core.ACL in Synology DiskStation Manager (DSM) before 6.2-23739-2 allows remote authenticated users to determine the existence and obtain the metadata of arbitrary files via the file_path parameter.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Synology | Skynas | - |
| Synology | Vs960Hd | - |
| Synology | Diskstation Manager | >= 6.1, < 6.1.7-15284-2 |
Related Weaknesses (CWE)
References
- https://www.synology.com/en-global/support/security/Synology_SA_18_36Vendor Advisory
- https://www.synology.com/en-global/support/security/Synology_SA_18_36Vendor Advisory
FAQ
What is CVE-2018-13281?
CVE-2018-13281 is a vulnerability with a CVSS score of 4.3 (MEDIUM). Information exposure vulnerability in SYNO.Core.ACL in Synology DiskStation Manager (DSM) before 6.2-23739-2 allows remote authenticated users to determine the existence and obtain the metadata of arb...
How severe is CVE-2018-13281?
CVE-2018-13281 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-13281?
Check the references section above for vendor advisories and patch information. Affected products include: Synology Skynas, Synology Vs960Hd, Synology Diskstation Manager.