Directory traversal vulnerability in download.php in Synology Photo Station before 6.5.3-3226 allows remote attackers to read arbitrary files via a full pathname in the id parameter.
                
            References
                    | Link | Resource | 
|---|---|
| https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-06-Local-File-Inclusion | Exploit Third Party Advisory | 
| https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 | Release Notes | 
| https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-06-Local-File-Inclusion | Exploit Third Party Advisory | 
| https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 | Release Notes | 
Configurations
                    History
                    21 Nov 2024, 02:43
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://bamboofox.github.io/2017/03/20/Synology-Bug-Bounty-2016/#Vul-06-Local-File-Inclusion - Exploit, Third Party Advisory | |
| References | () https://www.synology.com/en-global/support/security/Photo_Station_6_5_3_3226 - Release Notes | 
Information
                Published : 2017-05-12 20:29
Updated : 2025-04-20 01:37
NVD link : CVE-2016-10331
Mitre link : CVE-2016-10331
CVE.ORG link : CVE-2016-10331
JSON object : View
Products Affected
                synology
- photo_station
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
