CVE-2011-2522
Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
Published
2011-07-29T20:55:02.157
Last Modified
2025-04-11T00:51:21.963
Status
Deferred
Source
[email protected]
Severity
CVSSv2: 6.8 (MEDIUM)
CVSSv2 Vector
AV:N/AC:M/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: MEDIUM
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
8.6
Impact Score
6.4
Weaknesses
Affected Vendors & Products
References
-
http://jvn.jp/en/jp/JVN29529126/index.html
Third Party Advisory
([email protected])
-
http://marc.info/?l=bugtraq&m=133527864025056&w=2
Mailing List, Third Party Advisory
([email protected])
-
http://marc.info/?l=bugtraq&m=133527864025056&w=2
Mailing List, Third Party Advisory
([email protected])
-
http://osvdb.org/74071
Broken Link
([email protected])
-
http://samba.org/samba/history/samba-3.5.10.html
Vendor Advisory
([email protected])
-
http://secunia.com/advisories/45393
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/45488
Third Party Advisory
([email protected])
-
http://secunia.com/advisories/45496
Third Party Advisory
([email protected])
-
http://securityreason.com/securityalert/8317
Third Party Advisory
([email protected])
-
http://securitytracker.com/id?1025852
Third Party Advisory, VDB Entry
([email protected])
-
http://ubuntu.com/usn/usn-1182-1
Third Party Advisory
([email protected])
-
http://www.debian.org/security/2011/dsa-2290
Third Party Advisory
([email protected])
-
http://www.exploit-db.com/exploits/17577
Exploit, Third Party Advisory, VDB Entry
([email protected])
-
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543
Broken Link
([email protected])
-
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543
Broken Link
([email protected])
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:121
Broken Link
([email protected])
-
http://www.samba.org/samba/security/CVE-2011-2522
Vendor Advisory
([email protected])
-
http://www.securityfocus.com/bid/48899
Third Party Advisory, VDB Entry
([email protected])
-
https://bugzilla.redhat.com/show_bug.cgi?id=721348
Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://bugzilla.samba.org/show_bug.cgi?id=8290
Issue Tracking, Patch, Third Party Advisory
([email protected])
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/68843
Third Party Advisory, VDB Entry
([email protected])
-
http://jvn.jp/en/jp/JVN29529126/index.html
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://marc.info/?l=bugtraq&m=133527864025056&w=2
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://marc.info/?l=bugtraq&m=133527864025056&w=2
Mailing List, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://osvdb.org/74071
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://samba.org/samba/history/samba-3.5.10.html
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/45393
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/45488
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://secunia.com/advisories/45496
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securityreason.com/securityalert/8317
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://securitytracker.com/id?1025852
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://ubuntu.com/usn/usn-1182-1
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.debian.org/security/2011/dsa-2290
Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.exploit-db.com/exploits/17577
Exploit, Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:121
Broken Link
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.samba.org/samba/security/CVE-2011-2522
Vendor Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
http://www.securityfocus.com/bid/48899
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.redhat.com/show_bug.cgi?id=721348
Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://bugzilla.samba.org/show_bug.cgi?id=8290
Issue Tracking, Patch, Third Party Advisory
(af854a3a-2127-422b-91ae-364da2661108)
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/68843
Third Party Advisory, VDB Entry
(af854a3a-2127-422b-91ae-364da2661108)