Bug 905704 (CVE-2013-0214)
Summary: | CVE-2013-0214 samba: cross-site request forgery vulnerability in SWAT | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Vincent Danen <vdanen> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | asn, gdeschner, jlieskov, rhack, sbose, security-response-team |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | samba 4.0.2, samba 3.6.12, samba 3.5.21 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-03-17 18:16:39 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 906002, 906003, 957589, 957591, 1015359, 1073350, 1073351 | ||
Bug Blocks: | 905705, 952520, 974906 |
Description
Vincent Danen
2013-01-30 01:01:01 UTC
Acknowledgements: Red Hat would like to thank the Samba project for reporting this issue. Upstream acknowledges Jann Horn as the original reporter. This has been corrected in upstream versions 4.0.2, 3.6.12, and 3.5.21. External References: http://www.samba.org/samba/history/samba-4.0.2.html Created samba4 tracking bugs for this issue Affects: fedora-17 [bug 906003] Created samba tracking bugs for this issue Affects: fedora-all [bug 906002] External References: http://www.samba.org/samba/security/CVE-2013-0214 samba-3.6.12-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report. samba-4.0.2-1.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. samba-3.6.12-1.fc17.1 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report. Samba upstream wants to remove SWAT in Samba 4.1, see: https://lists.samba.org/archive/samba-technical/2013-February/090572.html Upstream commit: http://git.samba.org/?p=samba.git;a=commitdiff;h=91f4275 (In reply to Vincent Danen from comment #0) > It was reported [1] that Samba's SWAT web configuration interface suffered > from a potential cross-site request forgery (CSRF) vulnerability. This was an issue in the CSRF protection implementation that could possibly allow attacker to bypass existing CSRF protections if they knew victim's password. CSRF protection was added in upstream version 3.5.10, see CVE-2011-2522 / bug 721348. This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1310 https://rhn.redhat.com/errata/RHSA-2013-1310.html Statement: (none) This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1542 https://rhn.redhat.com/errata/RHSA-2013-1542.html This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2014:0305 https://rhn.redhat.com/errata/RHSA-2014-0305.html |