Synology Router Manager (SRM) before 1.2.4-8081 does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.
The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://www.synology.com/security/advisory/Synology_SA_20_14 | vendor advisory |
https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1086 | third party advisory exploit |