Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2013-6987

EPSS 30.23% · P97
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2013-6987

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Multiple directory traversal vulnerabilities in the FileBrowser components in Synology DiskStation Manager (DSM) before 4.3-3810 Update 3 allow remote attackers to read, write, and delete arbitrary files via a .. (dot dot) in the (1) path parameter to file_delete.cgi or (2) folder_path parameter to file_share.cgi in webapi/FileStation/; (3) dlink parameter to fbdownload/; or unspecified parameters to (4) html5_upload.cgi, (5) file_download.cgi, (6) file_sharing.cgi, (7) file_MVCP.cgi, or (8) file_rename.cgi in webapi/FileStation/.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Synology DiskStation Manager ‘FileBrowser’组件目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Synology DiskStation Manager(DSM)是群晖科技(Synology)公司的一套用于网络储存服务器(NAS)上的操作系统。该操作系统可管理资料、文件、照片、音乐等信息。 Synology DSM 4.3-3810 Update 3之前的版本中的FileBrowser组件中存在目录遍历漏洞,该漏洞源于(1)file_delete.cgi脚本没有正确过滤‘path’参数;(2)webapi/FileStation/目录下的file_share.cgi脚本没有正确过滤‘folder_p
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2013-6987

#POC DescriptionSource LinkShenlong Link
1exploit for DNS 4.3https://github.com/stoicboomer/CVE-2013-6987POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2013-6987

Please Login to view more intelligence information

Same Patch Batch · n/a · 2013-12-31 · 12 CVEs total

CVE-2012-0261OP5 Monitor和OP5 Appliance system-portal组件输入验证漏洞
CVE-2012-0262OP5 Monitor和OP5 Appliance system-op5config组件远程代码执行漏洞
CVE-2012-0263OP5 Monitor和OP5 Appliance 安全漏洞
CVE-2012-0264OP5 Monitor和OP5 Appliance 安全漏洞
CVE-2013-3572Ubiquiti Networks UniFi 跨站脚本漏洞
CVE-2013-3667Bare Bones Software Yojimbo/TextWrangler/BBEdit 安全漏洞
CVE-2013-5573CloudBees Jenkins ‘Descriotion’字段HTML注入漏洞
CVE-2013-6459will_paginate gem for Ruby 跨站脚本漏洞
CVE-2013-6983Cisco Unified Presence Server SQL注入漏洞
CVE-2013-7241Zenphoto 跨站脚本漏洞
CVE-2013-7242Zenphoto SQL注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2013-6987

No comments yet


Leave a comment