SSD Advisory – Synology DiskStation Manager Multiple Stored Cross-Site Scripting
Credit to Author: SSD / Maor Schwartz| Date: Sun, 21 May 2017 15:17:30 +0000
Want to get paid for a vulnerability similar to this one?
Contact us at: sxsxdx@xbxexyxoxnxdxsxexcxuxrxixtxy.xcom
Vulnerabilities Summary
The following advisory describe two (2) stored Cross-Site Scripting (XSS) found in Synology DiskStation Manager (DSM).
- Cross-site scripting stored in SWF file
- Cross-site scripting stored in Video Station application
Synology DiskStation Manager (DSM), a Linux based software package that is the operating system for the DiskStation and RackStation products. The Synology DSM is the foundation of the DiskStation, which integrates the basic functions of file sharing, centralized backup, RAID storage, multimedia streaming, virtual storage, and using the DiskStation as a network video recorder.
Credit
An independent security researcher has reported this vulnerability to Beyond Security’s SecuriTeam Secure Disclosure program.
Vendor response
Repeated emails (support@cynology.com) sent to the vendor, since March, were answered with unclear answers:
“Sorry for the misunderstanding. You reported it to us and what I meant was that our developers have verified your report and it’s been logged as a known issue now.
So, your report to us is highly appreciated and we thank you very much for your help!”
We therefore don’t know at this time whether this vulnerabilities were or not resolved.
Vulnerabilities Details
Cross-site scripting stored in SWF file
When a user use the “Open in a new window” function on SEF file, the DiskStation Manager operating system render the file and execute the content automatically. An attacker can upload malicious SWF file to trigger the XSS vulnerability.
Proof of Concept
- Sign in to Synology
- Open File Station (We chose the folder where we want to upload the malicious file.)
- Right click > Load in home > Load – Skip
- Select the *.swf file (which you want to upload)
- After you have uploaded the file, right click and “Open in a new window”
- The XSS has been executed correctly.
Cross-site scripting stored in Video Station application
Video Station application installed by default in DiskStation Manager operating system. By insert malicious script into “Title” tab that can be found in “Video Information” an attacker can trigger the XSS vulnerability.
Proof of Concept
- Go to Video Station
- Select a video > Choose “…”
- Click on “Edit Video Information”
- In the “Title” option, insert the following payload:
- Click again on “…”
- Choose the option “Shared public use”
- Click on checkbox > Go to link
- The XSS has been executed correctly.