Search for vulnerabilities
Vulnerability ID | VCID-msyj-kxsu-aaam |
Aliases |
CVE-2011-2522
|
Summary | Multiple cross-site request forgery (CSRF) vulnerabilities in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.10 allow remote attackers to hijack the authentication of administrators for requests that (1) shut down daemons, (2) start daemons, (3) add shares, (4) remove shares, (5) add printers, (6) remove printers, (7) add user accounts, or (8) remove user accounts, as demonstrated by certain start, stop, and restart parameters to the status program. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 6.2 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
Data source | Exploit-DB |
---|---|
Date added | July 27, 2011 |
Description | SWAT Samba Web Administration Tool - Cross-Site Request Forgery |
Ransomware campaign use | Known |
Source publication date | July 27, 2011 |
Exploit type | webapps |
Platform | cgi |
Source update date | Aug. 8, 2011 |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.81977 |
EPSS Score | 0.00790 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |