Synology-SA-20:07 Synology Calendar

Publish Time: 2020-04-29 18:23:24 UTC+8

Last Updated: 2022-08-03 10:16:34 UTC+8

Severity
Moderate
Status
Resolved

Abstract

Multiple vulnerabilities allow remote authenticated users to download arbitrary files or hijack the authentication of administrators via a susceptible version of Synology Calendar.

Affected Products

Product Severity Fixed Release Availability
Synology Calendar for DSM 6.2 Moderate Upgrade to 2.3.4-0631 or above.

Mitigation

None

Detail

  • CVE-2022-22686

    • Severity: Moderate
    • CVSS3 Base Score: 6.5
    • CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L
    • Cross-Site Request Forgery (CSRF) vulnerability in webapi component in Synology Calendar before 2.3.4-0631 allows remote authenticated users to hijack the authentication of administrators via unspecified vectors.
  • CVE-2022-27617

    • Severity: Moderate
    • CVSS3 Base Score: 5.0
    • CVSS3 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
    • Improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability in webapi component in Synology Calendar before 2.3.4-0631 allows remote authenticated users to download arbitrary files via unspecified vectors.

Acknowledgement

Qian Chen (@cq674350529) from Codesafe Team of Legendsec at Qi'anxin Group

Revision

Revision Date Description
1 2020-04-29 Initial public release.
2 2022-07-26 Disclosed vulnerability details.
3 2022-08-03 Disclosed vulnerability details.