ID

VAR-201409-0039


CVE

CVE-2012-1556


TITLE

Synology DiskStation Manager for Photo Station Vulnerable to cross-site scripting

Trust: 0.8

sources: JVNDB: JVNDB-2012-006269

DESCRIPTION

Cross-site scripting (XSS) vulnerability in Synology Photo Station 5 for DiskStation Manager (DSM) 3.2-1955 allows remote attackers to inject arbitrary web script or HTML via the name parameter to photo/photo_one.php. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks. Photo Station 5 DSM 3.2 (1955) is vulnerable; other versions may also be affected. Synology Photo Station 5 for DiskStation Manager (DSM) is a DSM (NAS operating system) based solution from Synology for sharing pictures, videos and blogs on the Internet. The vulnerability is caused by the photo/photo_one.php script not filtering the 'name' parameter sufficiently. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Drupal CKEditor / FCKeditor Modules Cross Site Scripting and Code Execution Vulnerabilities SECUNIA ADVISORY ID: SA48435 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48435/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48435 RELEASE DATE: 2012-03-15 DISCUSS ADVISORY: http://secunia.com/advisories/48435/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48435/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48435 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Two vulnerabilities have been reported in the CKEditor and FCKeditor modules for Drupal, which can be exploited by malicious users to compromise a vulnerable system and by malicious people to conduct cross-site scripting attacks. 1) Certain input when editing content is not properly sanitised before being returned to the user. 2) Certain unspecified input is not properly sanitised before being used. This can be exploited to execute arbitrary PHP code. Note: Successful exploitation of this vulnerability for FCKeditor version 6.x requires the "access fckeditor" permission and for CKEditor version 6.x requires the "access ckeditor" permission. The vulnerabilities are reported in the FCKeditor module versions 6.x-2.x prior to 6.x-2.3 and the CKEditor module versions 6.x-1.x prior to 6.x-1.9 and 7.x-1.x prior to 7.x-1.7. SOLUTION: Update to a fixed version. Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ PROVIDED AND/OR DISCOVERED BY: The vendor credits Heine Deelstra, the Drupal Security Team. ORIGINAL ADVISORY: SA-CONTRIB-2012-040: http://drupal.org/node/1482528 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . The vulnerability is reported in version 3.2-1995. Other versions may also be affected. SOLUTION: Filter malicious characters and character sequences using a proxy

Trust: 2.16

sources: NVD: CVE-2012-1556 // JVNDB: JVNDB-2012-006269 // BID: 52416 // VULHUB: VHN-54837 // PACKETSTORM: 110844 // PACKETSTORM: 110781

AFFECTED PRODUCTS

vendor:synologymodel:photo stationscope:eqversion:5

Trust: 2.4

vendor:synologymodel:diskstation managerscope:eqversion:3.2-1955

Trust: 1.6

vendor:synologymodel:diskstation managerscope:eqversion:(dsm) 3.2-1955

Trust: 0.8

vendor:synologymodel:inc photo station dsmscope:eqversion:53.2

Trust: 0.3

vendor:synologymodel:inc photo station dsmscope:neversion:54

Trust: 0.3

sources: BID: 52416 // JVNDB: JVNDB-2012-006269 // CNNVD: CNNVD-201203-222 // NVD: CVE-2012-1556

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1556
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-1556
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201203-222
value: MEDIUM

Trust: 0.6

VULHUB: VHN-54837
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2012-1556
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-54837
severity: MEDIUM
baseScore: 4.3
vectorString: AV:N/AC:M/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-54837 // JVNDB: JVNDB-2012-006269 // CNNVD: CNNVD-201203-222 // NVD: CVE-2012-1556

PROBLEMTYPE DATA

problemtype:CWE-79

Trust: 1.9

sources: VULHUB: VHN-54837 // JVNDB: JVNDB-2012-006269 // NVD: CVE-2012-1556

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-222

TYPE

xss

Trust: 0.8

sources: PACKETSTORM: 110844 // PACKETSTORM: 110781 // CNNVD: CNNVD-201203-222

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-006269

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-54837

PATCH

title:Photo Stationurl:http://forum.synology.com/enu/viewforum.php?f=17

Trust: 0.8

title:DSM 5.0url:https://www.synology.com/ja-jp/dsm/5.0

Trust: 0.8

sources: JVNDB: JVNDB-2012-006269

EXTERNAL IDS

db:NVDid:CVE-2012-1556

Trust: 2.8

db:BIDid:52416

Trust: 2.0

db:SECUNIAid:48334

Trust: 1.8

db:OSVDBid:80034

Trust: 1.7

db:JVNDBid:JVNDB-2012-006269

Trust: 0.8

db:CNNVDid:CNNVD-201203-222

Trust: 0.7

db:SECUNIAid:48435

Trust: 0.7

db:XFid:73976

Trust: 0.6

db:EXPLOIT-DBid:36944

Trust: 0.1

db:PACKETSTORMid:110696

Trust: 0.1

db:VULHUBid:VHN-54837

Trust: 0.1

db:PACKETSTORMid:110844

Trust: 0.1

db:PACKETSTORMid:110781

Trust: 0.1

sources: VULHUB: VHN-54837 // BID: 52416 // JVNDB: JVNDB-2012-006269 // PACKETSTORM: 110844 // PACKETSTORM: 110781 // CNNVD: CNNVD-201203-222 // NVD: CVE-2012-1556

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2012-03/0045.html

Trust: 2.6

url:http://www.securityfocus.com/bid/52416

Trust: 1.7

url:http://osvdb.org/80034

Trust: 1.7

url:http://secunia.com/advisories/48334

Trust: 1.7

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/73976

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1556

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1556

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/73976

Trust: 0.6

url:http://secunia.com/advisories/48435

Trust: 0.6

url:http://www.synology.com/us/products/features/photostation4.php

Trust: 0.3

url:/archive/1/521933

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.2

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/48435/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48435

Trust: 0.1

url:http://drupal.org/node/1482528

Trust: 0.1

url:http://secunia.com/advisories/48435/

Trust: 0.1

url:http://secunia.com/advisories/48334/#comments

Trust: 0.1

url:http://secunia.com/advisories/48334/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48334

Trust: 0.1

sources: VULHUB: VHN-54837 // BID: 52416 // JVNDB: JVNDB-2012-006269 // PACKETSTORM: 110844 // PACKETSTORM: 110781 // CNNVD: CNNVD-201203-222 // NVD: CVE-2012-1556

CREDITS

Simon Ganiere

Trust: 0.9

sources: BID: 52416 // CNNVD: CNNVD-201203-222

SOURCES

db:VULHUBid:VHN-54837
db:BIDid:52416
db:JVNDBid:JVNDB-2012-006269
db:PACKETSTORMid:110844
db:PACKETSTORMid:110781
db:CNNVDid:CNNVD-201203-222
db:NVDid:CVE-2012-1556

LAST UPDATE DATE

2024-08-14T12:39:54.096000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-54837date:2017-08-29T00:00:00
db:BIDid:52416date:2012-03-12T22:00:00
db:JVNDBid:JVNDB-2012-006269date:2014-09-16T00:00:00
db:CNNVDid:CNNVD-201203-222date:2014-09-15T00:00:00
db:NVDid:CVE-2012-1556date:2017-08-29T01:31:18.820

SOURCES RELEASE DATE

db:VULHUBid:VHN-54837date:2014-09-12T00:00:00
db:BIDid:52416date:2012-03-12T00:00:00
db:JVNDBid:JVNDB-2012-006269date:2014-09-16T00:00:00
db:PACKETSTORMid:110844date:2012-03-15T06:37:19
db:PACKETSTORMid:110781date:2012-03-14T05:16:33
db:CNNVDid:CNNVD-201203-222date:2012-03-14T00:00:00
db:NVDid:CVE-2012-1556date:2014-09-12T14:55:06.503