Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310114440
HistoryJul 28, 2023 - 12:00 a.m.

Synology Router Manager (SRM) 1.3.x < 1.3.1-9346-6 Multiple Vulnerabilities (Synology-SA-23:10) - Unreliable Remote Version Check

2023-07-2800:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
6
srm
vulnerabilities
remote version check
cve-2023-41738
cve-2023-41739
cve-2023-41740
cve-2023-41741
command injection
uncontrolled resource consumption
path traversal
information disclosure
firmware update.

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.4%

Synology Router Manager (SRM) is prone to multiple
vulnerabilities.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:synology:router_manager";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.114440");
  script_version("2024-03-15T15:36:48+0000");
  script_tag(name:"last_modification", value:"2024-03-15 15:36:48 +0000 (Fri, 15 Mar 2024)");
  # nb: This was initially a single VT but had to be split into two VTs in 2023. The original date
  # for both (the new and the old one) has been kept in this case.
  script_tag(name:"creation_date", value:"2023-07-28 04:38:34 +0000 (Fri, 28 Jul 2023)");
  script_tag(name:"cvss_base", value:"9.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-09-06 14:34:00 +0000 (Wed, 06 Sep 2023)");

  script_cve_id("CVE-2023-41738", "CVE-2023-41739", "CVE-2023-41740", "CVE-2023-41741");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Synology Router Manager (SRM) 1.3.x < 1.3.1-9346-6 Multiple Vulnerabilities (Synology-SA-23:10) - Unreliable Remote Version Check");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_synology_srm_consolidation.nasl");
  script_mandatory_keys("synology/srm/detected");

  script_tag(name:"summary", value:"Synology Router Manager (SRM) is prone to multiple
  vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The following vulnerabilities exist:

  - CVE-2023-41738: OS command injection

  - CVE-2023-41739: Uncontrolled resource consumption in File Functionality

  - CVE-2023-41740: Path traversal in the CGI component

  - CVE-2023-41741: Information disclosure in the CGI component");

  script_tag(name:"affected", value:"SRM version 1.3.x prior to 1.3.1-9346-6.");

  script_tag(name:"solution", value:"Update to firmware version 1.3.1-9346-6 or later.");

  script_xref(name:"URL", value:"https://www.synology.com/en-global/security/advisory/Synology_SA_23_10");

  exit(0);
}

include("host_details.inc");
include("revisions-lib.inc");
include("version_func.inc");

if (!version = get_app_version(cpe: CPE, nofork: TRUE))
  exit(0);

# nb: This is checked by VT 1.3.6.1.4.1.25623.1.0.150783
if (version =~ "^1\.3" && (revcomp(a: version, b: "1.3.1-9346") < 0))
  exit(0);

# nb: The patch level version cannot be obtained so when the fix is on a patch level version (e.g.
# 1.1.5-6542-4 and not 1.1.5-6542), there will be 2 VTs with different qod_type.
if (version =~ "^1\.3" && (revcomp(a: version, b: "1.3.1-9346-6") < 0)) {
  report = report_fixed_ver(installed_version: version, fixed_version: "1.3.1-9346-6");
  security_message(port: 0, data: report);
  exit(0);
}

exit(99);

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

43.4%

Related for OPENVAS:1361412562310114440