{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-50629","assignerOrgId":"db201096-a0cc-46c7-9a55-61d9e221bf01","state":"PUBLISHED","assignerShortName":"synology","dateReserved":"2024-10-28T02:41:27.549Z","datePublished":"2025-03-19T05:49:56.438Z","dateUpdated":"2025-03-28T01:10:51.638Z"},"containers":{"cna":{"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Encoding or Escaping of Output","cweId":"CWE-116","type":"CWE"}]}],"affected":[{"vendor":"Synology","product":"DiskStation Manager (DSM)","versions":[{"version":"7.2.2","status":"affected","lessThan":"7.2.2-72806-1","versionType":"semver"},{"version":"7.2.1","status":"affected","lessThan":"7.2.1-69057-6","versionType":"semver"},{"version":"7.2","status":"affected","lessThan":"7.2-64570-4","versionType":"semver"},{"version":"7.1","status":"affected","lessThan":"7.1.1-42962-7","versionType":"semver"},{"version":"0","status":"unknown","lessThan":"7.0","versionType":"semver"}],"defaultStatus":"affected"},{"vendor":"Synology","product":"BeeStation OS (BSM)","versions":[{"version":"1.1","status":"affected","lessThan":"1.1-65374","versionType":"semver"},{"version":"1.0","status":"affected","lessThan":"1.1-65374","versionType":"semver"},{"version":"0","status":"unknown","lessThan":"1.0","versionType":"semver"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"Improper encoding or escaping of output vulnerability in the webapi component in Synology BeeStation OS (BSM) before 1.1-65374 and Synology DiskStation Manager (DSM) before 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 allow remote attackers to read limited files via unspecified vectors."}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","version":"3.1"}}],"references":[{"url":"https://www.synology.com/en-global/security/advisory/Synology_SA_24_20","name":"Synology-SA-24:20 DSM (PWN2OWN 2024)","tags":["vendor-advisory"]},{"url":"https://www.synology.com/en-global/security/advisory/Synology_SA_24_23","name":"Synology-SA-24:23 BeeStation (PWN2OWN 2024)","tags":["vendor-advisory"]}],"credits":[{"lang":"en","value":"Pumpkin Chang (@u1f383) and Orange Tsai (@orange_8361) from DEVCORE Research Team","type":"finder"}],"providerMetadata":{"orgId":"db201096-a0cc-46c7-9a55-61d9e221bf01","shortName":"synology","dateUpdated":"2025-03-28T01:10:51.638Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-19T14:43:43.674740Z","id":"CVE-2024-50629","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-19T14:43:56.485Z"}}]}}