Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.
References
Link | Resource |
---|---|
https://twitter.com/amadapa/status/1342407005110218753 | Third Party Advisory |
https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html | Exploit Third Party Advisory |
https://twitter.com/amadapa/status/1342407005110218753 | Third Party Advisory |
https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 05:27
Type | Values Removed | Values Added |
---|---|---|
References | () https://twitter.com/amadapa/status/1342407005110218753 - Third Party Advisory | |
References | () https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html - Exploit, Third Party Advisory |
Information
Published : 2020-12-25 19:15
Updated : 2024-11-21 05:27
NVD link : CVE-2020-35710
Mitre link : CVE-2020-35710
CVE.ORG link : CVE-2020-35710
JSON object : View
Products Affected
parallels
- remote_application_server
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor