CVE-2011-2522

Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program.
References
Link Resource
http://jvn.jp/en/jp/JVN29529126/index.html Third Party Advisory
http://marc.info/?l=bugtraq&m=133527864025056&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=133527864025056&w=2 Mailing List Third Party Advisory
http://osvdb.org/74071 Broken Link
http://samba.org/samba/history/samba-3.5.10.html Vendor Advisory
http://secunia.com/advisories/45393 Third Party Advisory
http://secunia.com/advisories/45488 Third Party Advisory
http://secunia.com/advisories/45496 Third Party Advisory
http://securityreason.com/securityalert/8317 Third Party Advisory
http://securitytracker.com/id?1025852 Third Party Advisory VDB Entry
http://ubuntu.com/usn/usn-1182-1 Third Party Advisory
http://www.debian.org/security/2011/dsa-2290 Third Party Advisory
http://www.exploit-db.com/exploits/17577 Exploit Third Party Advisory VDB Entry
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 Broken Link
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 Broken Link
http://www.samba.org/samba/security/CVE-2011-2522 Vendor Advisory
http://www.securityfocus.com/bid/48899 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=721348 Issue Tracking Patch Third Party Advisory
https://bugzilla.samba.org/show_bug.cgi?id=8290 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/68843 Third Party Advisory VDB Entry
http://jvn.jp/en/jp/JVN29529126/index.html Third Party Advisory
http://marc.info/?l=bugtraq&m=133527864025056&w=2 Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=133527864025056&w=2 Mailing List Third Party Advisory
http://osvdb.org/74071 Broken Link
http://samba.org/samba/history/samba-3.5.10.html Vendor Advisory
http://secunia.com/advisories/45393 Third Party Advisory
http://secunia.com/advisories/45488 Third Party Advisory
http://secunia.com/advisories/45496 Third Party Advisory
http://securityreason.com/securityalert/8317 Third Party Advisory
http://securitytracker.com/id?1025852 Third Party Advisory VDB Entry
http://ubuntu.com/usn/usn-1182-1 Third Party Advisory
http://www.debian.org/security/2011/dsa-2290 Third Party Advisory
http://www.exploit-db.com/exploits/17577 Exploit Third Party Advisory VDB Entry
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 Broken Link
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 Broken Link
http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 Broken Link
http://www.samba.org/samba/security/CVE-2011-2522 Vendor Advisory
http://www.securityfocus.com/bid/48899 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=721348 Issue Tracking Patch Third Party Advisory
https://bugzilla.samba.org/show_bug.cgi?id=8290 Issue Tracking Patch Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/68843 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN29529126/index.html - Third Party Advisory () http://jvn.jp/en/jp/JVN29529126/index.html - Third Party Advisory
References () http://marc.info/?l=bugtraq&m=133527864025056&w=2 - Mailing List, Third Party Advisory () http://marc.info/?l=bugtraq&m=133527864025056&w=2 - Mailing List, Third Party Advisory
References () http://osvdb.org/74071 - Broken Link () http://osvdb.org/74071 - Broken Link
References () http://samba.org/samba/history/samba-3.5.10.html - Vendor Advisory () http://samba.org/samba/history/samba-3.5.10.html - Vendor Advisory
References () http://secunia.com/advisories/45393 - Third Party Advisory () http://secunia.com/advisories/45393 - Third Party Advisory
References () http://secunia.com/advisories/45488 - Third Party Advisory () http://secunia.com/advisories/45488 - Third Party Advisory
References () http://secunia.com/advisories/45496 - Third Party Advisory () http://secunia.com/advisories/45496 - Third Party Advisory
References () http://securityreason.com/securityalert/8317 - Third Party Advisory () http://securityreason.com/securityalert/8317 - Third Party Advisory
References () http://securitytracker.com/id?1025852 - Third Party Advisory, VDB Entry () http://securitytracker.com/id?1025852 - Third Party Advisory, VDB Entry
References () http://ubuntu.com/usn/usn-1182-1 - Third Party Advisory () http://ubuntu.com/usn/usn-1182-1 - Third Party Advisory
References () http://www.debian.org/security/2011/dsa-2290 - Third Party Advisory () http://www.debian.org/security/2011/dsa-2290 - Third Party Advisory
References () http://www.exploit-db.com/exploits/17577 - Exploit, Third Party Advisory, VDB Entry () http://www.exploit-db.com/exploits/17577 - Exploit, Third Party Advisory, VDB Entry
References () http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 - Broken Link () http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 - Broken Link
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 - Broken Link
References () http://www.samba.org/samba/security/CVE-2011-2522 - Vendor Advisory () http://www.samba.org/samba/security/CVE-2011-2522 - Vendor Advisory
References () http://www.securityfocus.com/bid/48899 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/48899 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=721348 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=721348 - Issue Tracking, Patch, Third Party Advisory
References () https://bugzilla.samba.org/show_bug.cgi?id=8290 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.samba.org/show_bug.cgi?id=8290 - Issue Tracking, Patch, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/68843 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/68843 - Third Party Advisory, VDB Entry

Information

Published : 2011-07-29 20:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2522

Mitre link : CVE-2011-2522

CVE.ORG link : CVE-2011-2522


JSON object : View

Products Affected

debian

  • debian_linux

samba

  • samba

canonical

  • ubuntu_linux
CWE
CWE-352

Cross-Site Request Forgery (CSRF)