CVE-2011-4749

The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 generates a password form field without disabling the autocomplete feature, which makes it easier for remote attackers to bypass authentication by leveraging an unattended workstation, as demonstrated by forms on certain pages under admin/index.php/default.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1_build1013110726.09:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:32

Type Values Removed Values Added
References () http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html - () http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/72260 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/72260 -

Information

Published : 2011-12-16 11:55

Updated : 2024-11-21 01:32


NVD link : CVE-2011-4749

Mitre link : CVE-2011-4749

CVE.ORG link : CVE-2011-4749


JSON object : View

Products Affected

redhat

  • enterprise_linux

parallels

  • parallels_plesk_panel
CWE
CWE-255

Credentials Management Errors