CVE-2011-4728

The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session, as demonstrated by cookies used by login_up.php3 and certain other files.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0_build1011110331.18:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html - () http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-1011110331.18-xss-sqli-cwe79-cwe89-javascript-injection-exception-example-poc-report-paros-burp-suite-pro-1.4.1.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/72331 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/72331 -

Information

Published : 2011-12-16 11:55

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4728

Mitre link : CVE-2011-4728

CVE.ORG link : CVE-2011-4728


JSON object : View

Products Affected

microsoft

  • windows

redhat

  • enterprise_linux

parallels

  • parallels_plesk_panel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor