ID

VAR-201708-1074


CVE

CVE-2017-11149


TITLE

Synology Download Station Server-side request forgery vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-007212

DESCRIPTION

Server-side request forgery (SSRF) vulnerability in Downloader in Synology Download Station 3.8.x before 3.8.5-3475 and 3.x before 3.5-2984 allows remote authenticated users to download arbitrary local files via crafted URI. Synology Download Station is a set of web-based download applications from Synology. The program supports protocols such as BT, FTP and HTTP to download files

Trust: 1.71

sources: NVD: CVE-2017-11149 // JVNDB: JVNDB-2017-007212 // VULHUB: VHN-101542

AFFECTED PRODUCTS

vendor:synologymodel:download stationscope:eqversion:3.5-2980

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.5-2963

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.5-2970

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.3-2382

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.5-2956

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.5-2973

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.5-2967

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.5-2962

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.5-2982

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.5-2968

Trust: 1.6

vendor:synologymodel:download stationscope:eqversion:3.8.4-3468

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.5-2638

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.5-2706

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.5-2955

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2480

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.8.3-3458

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.8.0-3416

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2477

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.2-2295

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.3-2383

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2478

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2558

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2486

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.8.2-3455

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2557

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2514

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.5-2705

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2490

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.3-2386

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2485

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2555

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.8.1-3420

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.4-2489

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.5-2984

Trust: 0.8

vendor:synologymodel:download stationscope:ltversion:3.x

Trust: 0.8

vendor:synologymodel:download stationscope:eqversion:3.8.5-3475

Trust: 0.8

vendor:synologymodel:download stationscope:ltversion:3.8.x

Trust: 0.8

sources: JVNDB: JVNDB-2017-007212 // CNNVD: CNNVD-201707-384 // NVD: CVE-2017-11149

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-11149
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-11149
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201707-384
value: MEDIUM

Trust: 0.6

VULHUB: VHN-101542
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-11149
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-101542
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-11149
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-101542 // JVNDB: JVNDB-2017-007212 // CNNVD: CNNVD-201707-384 // NVD: CVE-2017-11149

PROBLEMTYPE DATA

problemtype:CWE-918

Trust: 1.9

sources: VULHUB: VHN-101542 // JVNDB: JVNDB-2017-007212 // NVD: CVE-2017-11149

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201707-384

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201707-384

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007212

PATCH

title:Synology-SA-17:28 Download Stationurl:https://www.synology.com/en-global/support/security/Synology_SA_17_28_Download_Station

Trust: 0.8

title:Synology Download Station Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=99915

Trust: 0.6

sources: JVNDB: JVNDB-2017-007212 // CNNVD: CNNVD-201707-384

EXTERNAL IDS

db:NVDid:CVE-2017-11149

Trust: 2.5

db:JVNDBid:JVNDB-2017-007212

Trust: 0.8

db:CNNVDid:CNNVD-201707-384

Trust: 0.7

db:VULHUBid:VHN-101542

Trust: 0.1

sources: VULHUB: VHN-101542 // JVNDB: JVNDB-2017-007212 // CNNVD: CNNVD-201707-384 // NVD: CVE-2017-11149

REFERENCES

url:https://www.synology.com/en-global/support/security/synology_sa_17_28_download_station

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-11149

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-11149

Trust: 0.8

sources: VULHUB: VHN-101542 // JVNDB: JVNDB-2017-007212 // CNNVD: CNNVD-201707-384 // NVD: CVE-2017-11149

SOURCES

db:VULHUBid:VHN-101542
db:JVNDBid:JVNDB-2017-007212
db:CNNVDid:CNNVD-201707-384
db:NVDid:CVE-2017-11149

LAST UPDATE DATE

2025-04-20T23:23:37.964000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-101542date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2017-007212date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201707-384date:2019-10-17T00:00:00
db:NVDid:CVE-2017-11149date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-101542date:2017-08-14T00:00:00
db:JVNDBid:JVNDB-2017-007212date:2017-09-13T00:00:00
db:CNNVDid:CNNVD-201707-384date:2017-07-11T00:00:00
db:NVDid:CVE-2017-11149date:2017-08-14T19:29:00.770