ID

VAR-202106-1224


CVE

CVE-2021-34809


TITLE

Synology Download Station  Command injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2021-008292

DESCRIPTION

Improper neutralization of special elements used in a command ('Command Injection') vulnerability in task management component in Synology Download Station before 3.8.16-3566 allows remote authenticated users to execute arbitrary code via unspecified vectors. Synology Download Station Contains a command injection vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Synology Download Station is a browser extension. You can browse the downloading and downloaded tasks of the download center package without visiting the web version of Synology, and you can also add tasks

Trust: 1.71

sources: NVD: CVE-2021-34809 // JVNDB: JVNDB-2021-008292 // VULHUB: VHN-395053

AFFECTED PRODUCTS

vendor:synologymodel:download stationscope:ltversion:3.8.16-3566

Trust: 1.0

vendor:synologymodel:download stationscope:eqversion:3.8.16-3566

Trust: 0.8

vendor:synologymodel:download stationscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-008292 // NVD: CVE-2021-34809

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-34809
value: HIGH

Trust: 1.0

security@synology.com: CVE-2021-34809
value: CRITICAL

Trust: 1.0

NVD: CVE-2021-34809
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202106-1391
value: HIGH

Trust: 0.6

VULHUB: VHN-395053
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-34809
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-395053
severity: MEDIUM
baseScore: 6.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-34809
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 5.9
version: 3.1

Trust: 1.0

security@synology.com: CVE-2021-34809
baseSeverity: CRITICAL
baseScore: 9.9
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: CHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.1
impactScore: 6.0
version: 3.1

Trust: 1.0

NVD: CVE-2021-34809
baseSeverity: HIGH
baseScore: 8.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-395053 // JVNDB: JVNDB-2021-008292 // CNNVD: CNNVD-202106-1391 // NVD: CVE-2021-34809 // NVD: CVE-2021-34809

PROBLEMTYPE DATA

problemtype:CWE-77

Trust: 1.1

problemtype:Command injection (CWE-77) [ Other ]

Trust: 0.8

sources: VULHUB: VHN-395053 // JVNDB: JVNDB-2021-008292 // NVD: CVE-2021-34809

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202106-1391

TYPE

command injection

Trust: 0.6

sources: CNNVD: CNNVD-202106-1391

PATCH

title:Synology-SA-21url:https://www.synology.com/security/advisory/Synology_SA_21_11

Trust: 0.8

title:Synology Download Station Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155310

Trust: 0.6

sources: JVNDB: JVNDB-2021-008292 // CNNVD: CNNVD-202106-1391

EXTERNAL IDS

db:NVDid:CVE-2021-34809

Trust: 3.3

db:JVNDBid:JVNDB-2021-008292

Trust: 0.8

db:CNNVDid:CNNVD-202106-1391

Trust: 0.6

db:VULHUBid:VHN-395053

Trust: 0.1

sources: VULHUB: VHN-395053 // JVNDB: JVNDB-2021-008292 // CNNVD: CNNVD-202106-1391 // NVD: CVE-2021-34809

REFERENCES

url:https://www.synology.com/security/advisory/synology_sa_21_11

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2021-34809

Trust: 1.4

sources: VULHUB: VHN-395053 // JVNDB: JVNDB-2021-008292 // CNNVD: CNNVD-202106-1391 // NVD: CVE-2021-34809

SOURCES

db:VULHUBid:VHN-395053
db:JVNDBid:JVNDB-2021-008292
db:CNNVDid:CNNVD-202106-1391
db:NVDid:CVE-2021-34809

LAST UPDATE DATE

2024-08-14T14:11:21.899000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-395053date:2021-06-24T00:00:00
db:JVNDBid:JVNDB-2021-008292date:2022-03-11T08:51:00
db:CNNVDid:CNNVD-202106-1391date:2021-06-28T00:00:00
db:NVDid:CVE-2021-34809date:2021-06-24T02:19:20.917

SOURCES RELEASE DATE

db:VULHUBid:VHN-395053date:2021-06-18T00:00:00
db:JVNDBid:JVNDB-2021-008292date:2022-03-11T00:00:00
db:CNNVDid:CNNVD-202106-1391date:2021-06-17T00:00:00
db:NVDid:CVE-2021-34809date:2021-06-18T03:15:06.807