6.8

CVE-2011-2522

Exploit

Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.

Data is provided by the National Vulnerability Database (NVD)
SambaSamba Version >= 3.0.0 < 3.3.16
SambaSamba Version >= 3.4.0 < 3.4.14
SambaSamba Version >= 3.5.0 < 3.5.10
DebianDebian Linux Version5.0
DebianDebian Linux Version6.0
DebianDebian Linux Version7.0
CanonicalUbuntu Linux Version8.04 SwEdition-
CanonicalUbuntu Linux Version10.04 SwEdition-
CanonicalUbuntu Linux Version10.10
CanonicalUbuntu Linux Version11.04
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 11.36% 0.933
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.8 8.6 6.4
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-352 Cross-Site Request Forgery (CSRF)

The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.

http://marc.info/?l=bugtraq&m=133527864025056&w=2
Third Party Advisory
Mailing List
http://securitytracker.com/id?1025852
Third Party Advisory
VDB Entry
http://ubuntu.com/usn/usn-1182-1
Third Party Advisory
http://www.exploit-db.com/exploits/17577
Third Party Advisory
Exploit
VDB Entry
http://www.securityfocus.com/bid/48899
Third Party Advisory
VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=721348
Patch
Third Party Advisory
Issue Tracking
https://bugzilla.samba.org/show_bug.cgi?id=8290
Patch
Third Party Advisory
Issue Tracking