An information exposure vulnerability in forget_passwd.cgi in Synology DiskStation Manager (DSM) before 6.1.3-15152 allows remote attackers to enumerate valid usernames via unspecified vectors.
Recent assessments:
h00die at May 21, 2020 2:01pm UTC reported:
Vulnerability is trivial to exploit. Send a GET
request to /webman/forget_passwd.cgi?user=<username>
and check the response.
A user who can login will give:
{
"info" : "admin group",
"msg" : 1
}
A user who canβt login will give:
{
"info" : "no mail or no priviege",
"msg" : 2
}
An invalid user will give:
{
"info" : "get user info failed",
"msg" : 4
}
msg
3 means either the feature is disabled, or patched.
msg
5 means youβre locked out.
Default lockout policy is 10 logins in 5min. Each username enumeration counts as a login. Lockout is permanent by default.
Assessed Attacker Value: 1
Assessed Attacker Value: 1Assessed Attacker Value: 5