First published: Thu Jul 14 2011(Updated: )
It was found that the different user screens (HTML forms) of the Samba Web Administration Tool suite were missing protection against cross-site request forgery (CSRF) attacks. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could lead to unauthorized commands execution with the privileges of that user (for example shut down or start the samba daemons, add or remove shares, printers, user accounts if the victim authenticated as privileged user to Samba SWAT). Upstream bug report: [1] <a href="https://bugzilla.samba.org/show_bug.cgi?id=8290">https://bugzilla.samba.org/show_bug.cgi?id=8290</a> (not public yet) Acknowledgements: Red Hat would like to thank the Samba project for reporting this issue. Upstream acknowledges Yoshihiro Ishikawa of LAC Co., Ltd. as the original reporter.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/samba | <3.5.10 | 3.5.10 |
Samba | >=3.0.0<3.3.16 | |
Samba | >=3.4.0<3.4.14 | |
Samba | >=3.5.0<3.5.10 | |
Debian | =5.0 | |
Debian | =7.0 | |
Debian | =6.0 | |
Ubuntu | =10.10 | |
Ubuntu | =11.04 | |
Ubuntu | =8.04 | |
Ubuntu | =10.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2522 is considered a moderate severity vulnerability due to its potential for cross-site request forgery attacks.
To mitigate CVE-2011-2522, you should upgrade Samba to version 3.5.10 or later.
CVE-2011-2522 affects various versions of Samba, particularly those prior to 3.5.10 and specific Debian and Ubuntu versions.
Yes, CVE-2011-2522 can be exploited remotely by an attacker who tricks an authenticated Samba SWAT user into visiting a malicious URL.
CVE-2011-2522 lacks protection against cross-site request forgery (CSRF) attacks in its user interface.