vendor:
Samba Web Administration Tool
by:
Narendra
7.5
CVSS
HIGH
Cross-Site Request Forgery
352
CWE
Product Name: Samba Web Administration Tool
Affected Version From: Samba 3.0.x
Affected Version To: Samba 3.5.9
Patch Exists: YES
Related CWE: CVE-2011-2522
CPE: a:samba:samba
Metasploit:
https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2011-3585/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1220/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1221/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2011-2522/, https://www.rapid7.com/db/vulnerabilities/hpux-cve-2011-2522/, https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2011-1219/, https://www.rapid7.com/db/vulnerabilities/samba-cve-2011-2522/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2011-2522/, https://www.rapid7.com/db/vulnerabilities/vmsa-2012-0001-cve-2011-2522/
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: None
2011
Cross-Site Request Forgery in SWAT (Samba Web Administration Tool)
A Cross-Site Request Forgery (CSRF) vulnerability exists in Samba Web Administration Tool (SWAT) versions 3.0.x - 3.5.9 (inclusive). An attacker can exploit this vulnerability by sending a malicious request to the vulnerable server. This can be done by embedding a malicious HTML form in a web page, or by sending a malicious link via email or other methods. The malicious request will be executed on the vulnerable server, allowing the attacker to perform arbitrary actions with the privileges of the SWAT user.
Mitigation:
Upgrade to Samba 3.5.10 or later.