Lucene search

K

Synology Router Manager (SRM) 1.3.x < 1.3.1-9346-6 Multiple Vulnerabilities (Synology-SA-23:10) - Unreliable Remote Version Check

🗓️ 28 Jul 2023 00:00:00Reported by Copyright (C) 2023 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 17 Views

Synology Router Manager (SRM) 1.3.x < 1.3.1-9346-6 Multiple Vulnerabilities - Unreliable Remote Version Chec

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
Synology Router Manager (SRM) 1.3.x < 1.3.1-9346-6 Multiple Vulnerabilities (Synology-SA-23:10) - Remote Known Vulnerable Versions Check
28 Jul 202300:00
openvas
Cvelist
CVE-2023-41740
31 Aug 202309:08
cvelist
Cvelist
CVE-2023-41739
31 Aug 202309:08
cvelist
Cvelist
CVE-2023-41738
31 Aug 202309:08
cvelist
Cvelist
CVE-2023-41741
31 Aug 202309:08
cvelist
Vulnrichment
CVE-2023-41740
31 Aug 202309:08
vulnrichment
Vulnrichment
CVE-2023-41738
31 Aug 202309:08
vulnrichment
Vulnrichment
CVE-2023-41739
31 Aug 202309:08
vulnrichment
Vulnrichment
CVE-2023-41741
31 Aug 202309:08
vulnrichment
Zero Day Initiative
Synology RT6600ax WEB API Endpoint Command Injection Remote Code Execution Vulnerability
7 Sep 202300:00
zdi
Rows per page
# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:synology:router_manager";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.114440");
  script_version("2024-03-15T15:36:48+0000");
  script_tag(name:"last_modification", value:"2024-03-15 15:36:48 +0000 (Fri, 15 Mar 2024)");
  # nb: This was initially a single VT but had to be split into two VTs in 2023. The original date
  # for both (the new and the old one) has been kept in this case.
  script_tag(name:"creation_date", value:"2023-07-28 04:38:34 +0000 (Fri, 28 Jul 2023)");
  script_tag(name:"cvss_base", value:"9.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:C/I:C/A:C");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-09-06 14:34:00 +0000 (Wed, 06 Sep 2023)");

  script_cve_id("CVE-2023-41738", "CVE-2023-41739", "CVE-2023-41740", "CVE-2023-41741");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Synology Router Manager (SRM) 1.3.x < 1.3.1-9346-6 Multiple Vulnerabilities (Synology-SA-23:10) - Unreliable Remote Version Check");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("General");
  script_dependencies("gb_synology_srm_consolidation.nasl");
  script_mandatory_keys("synology/srm/detected");

  script_tag(name:"summary", value:"Synology Router Manager (SRM) is prone to multiple
  vulnerabilities.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"The following vulnerabilities exist:

  - CVE-2023-41738: OS command injection

  - CVE-2023-41739: Uncontrolled resource consumption in File Functionality

  - CVE-2023-41740: Path traversal in the CGI component

  - CVE-2023-41741: Information disclosure in the CGI component");

  script_tag(name:"affected", value:"SRM version 1.3.x prior to 1.3.1-9346-6.");

  script_tag(name:"solution", value:"Update to firmware version 1.3.1-9346-6 or later.");

  script_xref(name:"URL", value:"https://www.synology.com/en-global/security/advisory/Synology_SA_23_10");

  exit(0);
}

include("host_details.inc");
include("revisions-lib.inc");
include("version_func.inc");

if (!version = get_app_version(cpe: CPE, nofork: TRUE))
  exit(0);

# nb: This is checked by VT 1.3.6.1.4.1.25623.1.0.150783
if (version =~ "^1\.3" && (revcomp(a: version, b: "1.3.1-9346") < 0))
  exit(0);

# nb: The patch level version cannot be obtained so when the fix is on a patch level version (e.g.
# 1.1.5-6542-4 and not 1.1.5-6542), there will be 2 VTs with different qod_type.
if (version =~ "^1\.3" && (revcomp(a: version, b: "1.3.1-9346-6") < 0)) {
  report = report_fixed_ver(installed_version: version, fixed_version: "1.3.1-9346-6");
  security_message(port: 0, data: report);
  exit(0);
}

exit(99);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo