The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 includes a submitted password within an HTTP response body, which allows remote attackers to obtain sensitive information by sniffing the network, as demonstrated by password handling in certain files under client@1/domain@1/backup/local-repository/.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/72223 - |
Information
Published : 2011-12-16 11:55
Updated : 2024-11-21 01:33
NVD link : CVE-2011-4848
Mitre link : CVE-2011-4848
CVE.ORG link : CVE-2011-4848
JSON object : View
Products Affected
microsoft
- windows_server_2008
- windows_2003_server
parallels
- parallels_plesk_panel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor