First published: Fri May 20 2011(Updated: )
The SmarterTools SmarterStats 6.0 web server does not properly validate string data that is intended for storage in an XML document, which allows remote attackers to cause a denial of service (parsing error and daemon pause) via vectors involving (1) certain cookies in a SiteInfoLookup action to Admin/frmSites.aspx, or certain (2) cookies or (3) parameters to (a) Client/frmViewOverviewReport.aspx, (b) Client/frmViewReports.aspx, or (c) Services/SiteAdmin.asmx, as demonstrated by a ]]>> string, related to an "XML injection" issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SmarterTools SmarterStats | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2150 has a moderate severity level, allowing attackers to cause a denial of service.
To mitigate CVE-2011-2150, it is recommended to upgrade to the latest version of SmarterStats, which includes patches for this vulnerability.
CVE-2011-2150 can lead to system downtime due to parsing errors and daemon pauses when certain cookies are processed.
Yes, CVE-2011-2150 is exploitable remotely, meaning attackers can leverage this vulnerability from outside the network.
CVE-2011-2150 specifically affects SmarterStats version 6.0.