Vigil@nce - Samba: vulnerabilities of SWAT
February 2013 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can use two vulnerabilities of Samba Web
Administration Tool, in order to trigger a Clickjacking or a Cross
Site Request Forgery.
Impacted products: Debian, Fedora, MES, Mandriva Linux, openSUSE,
Samba
Severity: 2/4
Creation date: 30/01/2013
DESCRIPTION OF THE VULNERABILITY
The Samba server can be administered via the SWAT (Samba Web
Administration Tool) web interface, which is not enabled by
default. Two vulnerabilities impact SWAT.
An attacker can create an HTML page, using an IFRAME to integrate
SWAT pages, in order to invite the administrator to click in SWAT,
to trigger a privileged operation. [severity:2/4; CVE-2013-0213]
An attacker, who has a valid password, but who cannot login on
SWAT (forbidden IP address for example), can use a Cross Site
Request Forgery, in order to trigger a privileged operation.
[severity:1/4; CVE-2013-0214]
An attacker can therefore use two vulnerabilities of Samba Web
Administration Tool, in order to trigger a Clickjacking or a Cross
Site Request Forgery.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Samba-vulnerabilities-of-SWAT-12357