CVE-2011-2694

Cross-site scripting (XSS) vulnerability in the chg_passwd function in web/swat.c in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allows remote authenticated administrators to inject arbitrary web script or HTML via the username parameter to the passwd program (aka the user field to the Change Password page).
References
Link Resource
http://jvn.jp/en/jp/JVN63041502/index.html Third Party Advisory
http://osvdb.org/74072 Broken Link
http://samba.org/samba/history/samba-3.5.10.html Vendor Advisory
http://secunia.com/advisories/45393 Not Applicable Vendor Advisory
http://secunia.com/advisories/45488 Not Applicable Third Party Advisory
http://secunia.com/advisories/45496 Not Applicable Third Party Advisory
http://securitytracker.com/id?1025852 Broken Link Third Party Advisory VDB Entry
http://ubuntu.com/usn/usn-1182-1 Third Party Advisory
http://www.debian.org/security/2011/dsa-2290 Third Party Advisory
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 Broken Link Third Party Advisory
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 Broken Link Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 Broken Link
http://www.samba.org/samba/security/CVE-2011-2694 Vendor Advisory
http://www.securityfocus.com/bid/48901 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=722537 Issue Tracking Patch
https://bugzilla.samba.org/show_bug.cgi?id=8289 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68844 Third Party Advisory VDB Entry
http://jvn.jp/en/jp/JVN63041502/index.html Third Party Advisory
http://osvdb.org/74072 Broken Link
http://samba.org/samba/history/samba-3.5.10.html Vendor Advisory
http://secunia.com/advisories/45393 Not Applicable Vendor Advisory
http://secunia.com/advisories/45488 Not Applicable Third Party Advisory
http://secunia.com/advisories/45496 Not Applicable Third Party Advisory
http://securitytracker.com/id?1025852 Broken Link Third Party Advisory VDB Entry
http://ubuntu.com/usn/usn-1182-1 Third Party Advisory
http://www.debian.org/security/2011/dsa-2290 Third Party Advisory
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 Broken Link Third Party Advisory
http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 Broken Link Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 Broken Link
http://www.samba.org/samba/security/CVE-2011-2694 Vendor Advisory
http://www.securityfocus.com/bid/48901 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=722537 Issue Tracking Patch
https://bugzilla.samba.org/show_bug.cgi?id=8289 Issue Tracking Patch
https://exchange.xforce.ibmcloud.com/vulnerabilities/68844 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*
cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:10.10:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:11.04:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN63041502/index.html - Third Party Advisory () http://jvn.jp/en/jp/JVN63041502/index.html - Third Party Advisory
References () http://osvdb.org/74072 - Broken Link () http://osvdb.org/74072 - Broken Link
References () http://samba.org/samba/history/samba-3.5.10.html - Vendor Advisory () http://samba.org/samba/history/samba-3.5.10.html - Vendor Advisory
References () http://secunia.com/advisories/45393 - Not Applicable, Vendor Advisory () http://secunia.com/advisories/45393 - Not Applicable, Vendor Advisory
References () http://secunia.com/advisories/45488 - Not Applicable, Third Party Advisory () http://secunia.com/advisories/45488 - Not Applicable, Third Party Advisory
References () http://secunia.com/advisories/45496 - Not Applicable, Third Party Advisory () http://secunia.com/advisories/45496 - Not Applicable, Third Party Advisory
References () http://securitytracker.com/id?1025852 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1025852 - Broken Link, Third Party Advisory, VDB Entry
References () http://ubuntu.com/usn/usn-1182-1 - Third Party Advisory () http://ubuntu.com/usn/usn-1182-1 - Third Party Advisory
References () http://www.debian.org/security/2011/dsa-2290 - Third Party Advisory () http://www.debian.org/security/2011/dsa-2290 - Third Party Advisory
References () http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 - Broken Link, Third Party Advisory () http://www.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c03008543 - Broken Link, Third Party Advisory
References () http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 - Broken Link () http://www.mandriva.com/security/advisories?name=MDVSA-2011:121 - Broken Link
References () http://www.samba.org/samba/security/CVE-2011-2694 - Vendor Advisory () http://www.samba.org/samba/security/CVE-2011-2694 - Vendor Advisory
References () http://www.securityfocus.com/bid/48901 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/48901 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=722537 - Issue Tracking, Patch () https://bugzilla.redhat.com/show_bug.cgi?id=722537 - Issue Tracking, Patch
References () https://bugzilla.samba.org/show_bug.cgi?id=8289 - Issue Tracking, Patch () https://bugzilla.samba.org/show_bug.cgi?id=8289 - Issue Tracking, Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/68844 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/68844 - Third Party Advisory, VDB Entry

Information

Published : 2011-07-29 20:55

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2694

Mitre link : CVE-2011-2694

CVE.ORG link : CVE-2011-2694


JSON object : View

Products Affected

canonical

  • ubuntu_linux

samba

  • samba

debian

  • debian_linux
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')