Vulnerability Details : CVE-2011-2158
The SmarterTools SmarterStats 6.0 web server sends incorrect Content-Type headers for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving (1) Admin/frmSite.aspx, (2) Admin/frmSites.aspx, (3) Admin/frmViewReports.aspx, (4) App_Themes/AboutThisFolder.txt, (5) Client/frmViewReports.aspx, (6) Temp/AboutThisFolder.txt, (7) default.aspx, (8) login.aspx, or (9) certain .jpg URIs under Temp/. NOTE: it is possible that only clients, not the SmarterStats product, could be affected by this issue.
Exploit prediction scoring system (EPSS) score for CVE-2011-2158
Probability of exploitation activity in the next 30 days: 1.07%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-2158
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2011-2158
-
http://www.kb.cert.org/vuls/id/240150
VU#240150 - SmarterTools default basic web server vulnerabilitiesUS Government Resource
-
http://xss.cx/examples/exploits/stored-reflected-xss-cwe79-smarterstats624100.html
CVE-2011-4750, SmarterTools WebServer, CVE-2011-2151, CVE-2011-2155, CVE-2011-4751, CVE-2011-2154, CVE-2011-2158, CVE-2011-4752, Stored + Reflected XSS, SmarterTools 6.x (6.2.4100), Cross Site Scripti
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/67824
SmarterTools SmarterStats Content-Type header unspecified CVE-2011-2158 Vulnerability Report
-
http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html
SQL Injection, XML Injection, OS Command Injection, SmarterStats 6.0
-
http://www.kb.cert.org/vuls/id/MORO-8GYQR4
VU#240150 - SmarterTools default basic web server vulnerabilitiesUS Government Resource
Products affected by CVE-2011-2158
- cpe:2.3:a:smartertools:smarterstats:6.0:*:*:*:*:*:*:*