Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-2522


Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.


Published

2011-07-29T20:55:02.157

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-352

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application samba samba < 3.3.16 Yes
Application samba samba < 3.4.14 Yes
Application samba samba < 3.5.10 Yes
Operating System debian debian_linux 5.0 Yes
Operating System debian debian_linux 6.0 Yes
Operating System debian debian_linux 7.0 Yes
Operating System canonical ubuntu_linux 8.04 Yes
Operating System canonical ubuntu_linux 10.04 Yes
Operating System canonical ubuntu_linux 10.10 Yes
Operating System canonical ubuntu_linux 11.04 Yes

References