Description
Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology DNS Server before 2.2.2-5027 allows remote authenticated users to delete arbitrary files via unspecified vectors.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-32116 | Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in cgi component in Synology DNS Server before 2.2.2-5027 allows remote authenticated users to delete arbitrary files via unspecified vectors. |
References
| Link | Providers |
|---|---|
| https://www.synology.com/security/advisory/Synology_SA_20_27 |
|
History
No history.
Status: PUBLISHED
Assigner: synology
Published:
Updated: 2024-09-16T23:16:05.261Z
Reserved: 2022-03-21T00:00:00.000Z
Link: CVE-2022-27615
No data.
Status : Modified
Published: 2022-07-28T04:15:09.887
Modified: 2024-11-21T06:56:01.797
Link: CVE-2022-27615
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD