CVE-2011-1127 (GCVE-0-2011-1127)
Vulnerability from cvelistv5 – Published: 2011-06-21 01:00 – Updated: 2024-09-17 03:23
VLAI?
Summary
SSI.php in Simple Machines Forum (SMF) before 1.1.13, and 2.x before 2.0 RC5, does not properly restrict guest access, which allows remote attackers to have an unspecified impact via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:14:27.946Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[oss-security] 20110222 CVE request: simple machines forum before 1.1.13",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/22/17"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.simplemachines.org/community/index.php?topic=421547.0"
},
{
"name": "[oss-security] 20110302 Re: CVE request: simple machines forum before 1.1.13",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2011/03/02/4"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SSI.php in Simple Machines Forum (SMF) before 1.1.13, and 2.x before 2.0 RC5, does not properly restrict guest access, which allows remote attackers to have an unspecified impact via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2011-06-21T01:00:00Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[oss-security] 20110222 CVE request: simple machines forum before 1.1.13",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/02/22/17"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.simplemachines.org/community/index.php?topic=421547.0"
},
{
"name": "[oss-security] 20110302 Re: CVE request: simple machines forum before 1.1.13",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2011/03/02/4"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-1127",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SSI.php in Simple Machines Forum (SMF) before 1.1.13, and 2.x before 2.0 RC5, does not properly restrict guest access, which allows remote attackers to have an unspecified impact via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[oss-security] 20110222 CVE request: simple machines forum before 1.1.13",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/02/22/17"
},
{
"name": "http://www.simplemachines.org/community/index.php?topic=421547.0",
"refsource": "CONFIRM",
"url": "http://www.simplemachines.org/community/index.php?topic=421547.0"
},
{
"name": "[oss-security] 20110302 Re: CVE request: simple machines forum before 1.1.13",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2011/03/02/4"
},
{
"name": "http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip",
"refsource": "CONFIRM",
"url": "http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-1127",
"datePublished": "2011-06-21T01:00:00Z",
"dateReserved": "2011-03-02T00:00:00Z",
"dateUpdated": "2024-09-17T03:23:36.103Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2011-1127\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-06-21T02:52:42.310\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"SSI.php in Simple Machines Forum (SMF) before 1.1.13, and 2.x before 2.0 RC5, does not properly restrict guest access, which allows remote attackers to have an unspecified impact via unknown vectors.\"},{\"lang\":\"es\",\"value\":\"SSI.php en Simple Machines Forum ( SMF ) antes de v1.1.13, y v2.x antes de v2.0 RC5, no restringe correctamente el acceso de invitados, lo que permite a atacantes remotos tener un impacto no especificado a trav\u00e9s de vectores desconocidos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.1.12\",\"matchCriteriaId\":\"EFF49A27-0BCD-44BA-B0A7-701BA44F2CE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A85D503-FACF-4814-8E67-E6EEE93FB23D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8BA3B1D-A1F6-419B-9944-AF01B785C626\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0:beta4.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B164981-7F13-43B3-BA29-4F4D52EAC466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"838FA5D8-79E6-4B42-BC0A-51FEA2515442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7CC60C4-EED4-41AA-A5DF-5332E6D66E80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9F73B7F-8FF3-4A13-943D-C6BF353A5296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"63FA8C3A-ACF7-4C97-9380-9E144FDF7DF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E019CBA-7837-4260-8A86-559C483E405C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AD93454-C8FA-4966-96D1-AA7DFA0D3C47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07D1D8AB-9927-41D5-A81B-B035B661D7E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"543D57E7-B3D0-4714-B5FB-336A1627E1A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FECEABB-BE07-412B-9A08-EAC79A5215D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A55E760-7CD8-4590-86B9-11ACA1202A23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1397297A-7087-42AD-B3D6-1DAA71D3E6DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5F0958C-8FC7-44B2-819D-6688A7D40632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A454C424-E1CD-46A4-A9AC-12BB22400D64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"732474E6-B87C-4AFA-9868-3559634A688D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3F625DB-65E9-41FB-B733-CC4AEF1B9895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD622FF4-C724-4D50-9712-5E632F3E83CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D01CD63D-16B7-4D98-9E67-CF0838A65FFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46A72FB0-88A3-4E2E-B34C-E51EE91A51E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79296012-575A-42EC-9E9A-4549346D7475\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25089E42-354D-4A0C-8845-01F6800446D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A992F6-5BD0-458B-A813-6EA539249FAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8C8198A-38C0-481A-BDBE-D193E69C5462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95AE6F3E-1B4C-425B-8B9C-DD32B534F234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.0.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71405233-0271-4081-B082-208A74B2E8B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"682BE6FC-F9FC-4C90-A56B-EC05B518C55F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7122D896-354C-4E62-B507-1898DEC6F00E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"17C92F5C-C1C9-4D05-B096-755CC6DFAA51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"268C6140-13DE-43F2-958D-7882AC342E2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"755E8504-6C4A-467A-835B-222EEB77CE8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB5AF099-0B41-48C6-810E-A4AF7B3EB646\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CFE75DC-93E1-487B-B50C-1465A98956AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"920956A5-C343-4FCF-9BF3-F4E8C79F9993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1539E360-712B-4DF1-813C-82F87C0946FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2530C440-9C8C-4966-88B0-176D8FEBDFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565A8842-9B1E-4764-85E2-021F7825A1CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"603B3808-FDFF-432E-8937-984897377BB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5656FF9-3F20-476C-A3F7-69EED049E669\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5187CA56-26DD-4042-82DC-FCD0CB8A84FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB527C06-DEAB-416D-ABBD-F0A7F33F91D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A8C2083-53A9-4E71-A268-D8690A288F8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0127EAC8-B363-4262-B80E-FF7415701038\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6FEC752-D94D-4D0D-BC96-82654F69144D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:1.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5188CC8-45B8-4A07-B474-6B92C7F15276\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFBA92BD-F323-4786-A31E-E01642CFD415\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE71E13C-0DDE-46ED-99E1-0D71E6539EE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:beta2.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E54A4CD9-AB69-4DF9-AA3A-0C3A0532FF15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6BDF574-AD5F-44AB-95AB-1790E4563977\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:beta3.1:*:*:*:*:*:*\",\"matchCriteriaId\":\"62B1D7AB-039A-4496-A55C-6BFCFC40BD37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"804FC715-BF72-4E2D-8129-6E499E3F48F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4B5EA47-4175-4E39-A2E8-66CF592DFA48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DE1E832-43E7-4650-9F48-FDEEB75C1B93\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEEDEDCF-E956-4F2E-B13D-9E63DF6B31AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:simplemachines:smf:2.0:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5582EEF9-33A8-42C0-A2BF-E0A1EA431187\"}]}]}],\"references\":[{\"url\":\"http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/02/22/17\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/03/02/4\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.simplemachines.org/community/index.php?topic=421547.0\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://custom.simplemachines.org/mods/downloads/smf_patch_2.0-RC4_security.zip\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/02/22/17\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/03/02/4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.simplemachines.org/community/index.php?topic=421547.0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…