CVE-2011-2153
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Login.aspx in the SmarterTools SmarterStats 6.0 web server supports URLs containing txtUser and txtPass parameters in the query string, which makes it easier for context-dependent attackers to discover credentials by reading (1) web-server access logs, (2) web-server Referer logs, or (3) the browser history, related to a "cross-domain Referer leakage" issue.
Login.aspx en el servidor web SmarterTools SmarterStats v6.0 admite URL que contienen parámetros txtUser y txtPass en la cadena de consulta, lo que hace que sea más fácil para los atacantes dependientes del contexto descubrir las credenciales mediante la lectura (1) registros de acceso al servidor web, (2) registros de referidos al servidor web, o (3) el historial del navegador
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-05-20 CVE Reserved
- 2011-05-20 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.kb.cert.org/vuls/id/240150 | Third Party Advisory | |
http://www.kb.cert.org/vuls/id/MORO-8GYQR4 | Us Government Resource | |
http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/67829 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Smartertools Search vendor "Smartertools" | Smarterstats Search vendor "Smartertools" for product "Smarterstats" | 6.0 Search vendor "Smartertools" for product "Smarterstats" and version "6.0" | - |
Affected
|