On Synology NAS, synophoto_dsm_user executable, part of PhotoStation package, was leaking NAS user password on the command line.
Using a simple shell loop to run "ps ax | grep synophoto_dsm_user", it was possible to get user and password credentials for user on the NAS who had PhotoStation enabled with their DSM credentials.
Fortunately, by default, shell access on the NAS is not available (by ssh or telnet), it has to be enabled by the admin.
Still, it is a bad practise to pass credentials to process using command line, which can be intercepted.
PhotoStation version 6.7.1-3419 or earlier is vulnerable. I've contacted Synology and they should release a security fix really shortly, as well as a CVE for it.
Update (June 13, 2017): Synology has released a CVE and the vulnerability is fixed in PhotoStation 6.7.2-3429 or later. Remember to update this package on your NAS !
Friday, June 9, 2017
Synology PhotoStation password vulnerability
Labels: General
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment