CVE-2011-2522
SWAT Samba Web Administration Tool - Cross-Site Request Forgery
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
Varias vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en la herramienta Samba Web Administration (SWAT) en Samba v3.x antes de v3.5.10 permite a atacantes remotos secuestrar la autenticación de los administradores para las peticiones que (1) apagan los demonios, (2) inician los demonios, (3) agregan recursos compartidos, (4) quitan recursos compartidos, (5) agregan impresoras, (6) eliminan impresoras (7), agregan cuentas de usuario, o (8) quitan cuentas de usuario, como lo demuestran ciertos parámetros de inicio, parada, y reinicio del programa de estado.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-06-15 CVE Reserved
- 2011-07-27 CVE Published
- 2011-07-27 First Exploit
- 2023-03-08 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (21)
URL | Tag | Source |
---|---|---|
http://jvn.jp/en/jp/JVN29529126/index.html | Third Party Advisory | |
http://osvdb.org/74071 | Broken Link | |
http://secunia.com/advisories/45393 | Third Party Advisory | |
http://secunia.com/advisories/45488 | Third Party Advisory | |
http://secunia.com/advisories/45496 | Third Party Advisory | |
http://securityreason.com/securityalert/8317 | Third Party Advisory | |
http://securitytracker.com/id?1025852 | Third Party Advisory | |
http://www.securityfocus.com/bid/48899 | Third Party Advisory | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68843 | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/17577 | 2011-07-27 | |
http://www.exploit-db.com/exploits/17577 | 2024-08-06 |
URL | Date | SRC |
---|---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=721348 | 2011-08-29 | |
https://bugzilla.samba.org/show_bug.cgi?id=8290 | 2022-08-29 |
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=133527864025056&w=2 | 2022-08-29 | |
http://samba.org/samba/history/samba-3.5.10.html | 2022-08-29 | |
http://ubuntu.com/usn/usn-1182-1 | 2022-08-29 | |
http://www.debian.org/security/2011/dsa-2290 | 2022-08-29 | |
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 | 2022-08-29 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 | 2022-08-29 | |
http://www.samba.org/samba/security/CVE-2011-2522 | 2022-08-29 | |
https://access.redhat.com/security/cve/CVE-2011-2522 | 2011-08-29 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Samba Search vendor "Samba" | Samba Search vendor "Samba" for product "Samba" | >= 3.0.0 < 3.3.16 Search vendor "Samba" for product "Samba" and version " >= 3.0.0 < 3.3.16" | - |
Affected
| ||||||
Samba Search vendor "Samba" | Samba Search vendor "Samba" for product "Samba" | >= 3.4.0 < 3.4.14 Search vendor "Samba" for product "Samba" and version " >= 3.4.0 < 3.4.14" | - |
Affected
| ||||||
Samba Search vendor "Samba" | Samba Search vendor "Samba" for product "Samba" | >= 3.5.0 < 3.5.10 Search vendor "Samba" for product "Samba" and version " >= 3.5.0 < 3.5.10" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 5.0 Search vendor "Debian" for product "Debian Linux" and version "5.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 6.0 Search vendor "Debian" for product "Debian Linux" and version "6.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 8.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "8.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.04" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 10.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "10.10" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 11.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "11.04" | - |
Affected
|