{ "schema_version": "1.4.0", "id": "GHSA-r6cx-xm47-5v7p", "modified": "2022-05-17T01:55:32Z", "published": "2022-05-17T01:55:32Z", "aliases": [ "CVE-2011-2148" ], "details": "Admin/frmSite.aspx in the SmarterTools SmarterStats 6.0 web server allows remote attackers to execute arbitrary commands via vectors involving a leading and trailing & (ampersand) character, and (1) an STTTState cookie, (2) the ctl00%24MPH%24txtAdminNewPassword_SettingText parameter, (3) the ctl00%24MPH%24txtSmarterLogDirectory parameter, (4) the ctl00%24MPH%24ucSiteSeoSearchEngineSettings%24chklistEngines_SettingCheckBox%2414 parameter, (5) the ctl00%24MPH%24ucSiteSeoSettings%24txtSeoMaxKeywords_SettingText parameter, or (6) the ctl00_MPH_grdLogLocations_HiddenLSR parameter, related to an \"OS command injection\" issue.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2148" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67834" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/240150" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/MORO-8GYQR4" }, { "type": "WEB", "url": "http://xss.cx/examples/smarterstats-60-oscommandinjection-directorytraversal-xml-sqlinjection.html.html" } ], "database_specific": { "cwe_ids": [ "CWE-78" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2011-05-20T22:55:00Z" } }