SQL Injection Vulnerability in Synology Surveillance Station
CVE-2024-29238
8.8HIGH
Summary
The vulnerability in the Log.CountByCategory web API component of Synology Surveillance Station can allow remote authenticated users to exploit improper neutralization of special elements within SQL commands. This could potentially enable them to inject arbitrary SQL commands through unvalidated inputs, posing a significant risk to the database security and the integrity of the stored data in versions prior to 9.2.0-9289 and 9.2.0-11289.
Affected Version(s)
Surveillance Station *
Surveillance Station * < 9.2.0-9289
Surveillance Station * < 9.2.0-11289
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
TEAM.ENVY (https://team-envy.gitbook.io/team.envy/about-us)