Relative path traversal vulnerability in Attachment Uploader in Synology Calendar before 2.2.2-0532 allows remote authenticated users to upload arbitrary files via the filename parameter.
Vector
NETWORK
Complexity
LOW
Authentication
SINGLE_INSTANCE
Confidentiality
NONE
Integrity
PARTIAL
Availability
NONE
Synology Calendar 2.1.2-0511 (not an official CPE)
Synology Calendar 2.1.1-0502 (not an official CPE)
Synology Calendar 2.1.0-0425 (not an official CPE)
Synology Calendar 2.0.1-0242 (not an official CPE)
Synology Calendar 2.0.0-0241 (not an official CPE)
Synology Calendar 1.1.0-0146 (not an official CPE)
Synology Calendar 1.0.3-0132 (not an official CPE)
Synology Calendar 1.0.2-0131 (not an official CPE)
Synology Calendar 1.0.0-0121 (not an official CPE)
Synology Calendar 2.2.1-0518 (not an official CPE)
Advisory | Patch | Confirmed | Link |
---|---|---|---|
https://www.synology.com/security/advisory/Synology_SA_1... |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (ID 22)
Related CAPEC 7
Relative Path Traversal (CAPEC-ID 139)
Directory Traversal (CAPEC-ID 213)
File System Function Injection, Content Based (CAPEC-ID 23)
Using Slashes and URL Encoding Combined to Bypass Validation Logic (CAPEC-ID 64)
Manipulating Input to File System Calls (CAPEC-ID 76)
Using Escaped Slashes in Alternate Encoding (CAPEC-ID 78)
Using Slashes in Alternate Encoding (CAPEC-ID 79)