CVE-2020-35710

Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:parallels:remote_application_server:18.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:27

Type Values Removed Values Added
References () https://twitter.com/amadapa/status/1342407005110218753 - Third Party Advisory () https://twitter.com/amadapa/status/1342407005110218753 - Third Party Advisory
References () https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html - Exploit, Third Party Advisory () https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html - Exploit, Third Party Advisory

Information

Published : 2020-12-25 19:15

Updated : 2024-11-21 05:27


NVD link : CVE-2020-35710

Mitre link : CVE-2020-35710

CVE.ORG link : CVE-2020-35710


JSON object : View

Products Affected

parallels

  • remote_application_server
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor