Parallels Plesk Panel の Server Administration Panel における Cookie をキャプチャされる脆弱性
| Title |
Parallels Plesk Panel の Server Administration Panel における Cookie をキャプチャされる脆弱性
|
| Summary |
Parallels Plesk Panel の Server Administration Panel は、https セッション内に Cookie への secure フラグを設定しないため、Cookie をキャプチャされる脆弱性が存在します。
|
| Possible impacts |
第三者により、HTTP セッション内の送信を傍受されることで、Cookie をキャプチャされる可能性があります。 |
| Solution |
ベンダ情報および参考情報を参照して適切な対策を実施してください。 |
| Publication Date |
Dec. 16, 2011, midnight |
| Registration Date |
Dec. 19, 2011, 4:32 p.m. |
| Last Update |
Dec. 19, 2011, 4:32 p.m. |
|
CVSS2.0 : 警告
|
| Score |
5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:N/A:N |
Affected System
| Parallels |
|
Parallels Plesk Panel 10.2.0_build1011110331.18
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
| No |
Changed Details |
Date of change |
| 0 |
[2011年12月19日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |
NVD Vulnerability Information
CVE-2011-4728
| Summary |
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session, as demonstrated by cookies used by login_up.php3 and certain other files.
|
| Publication Date |
Dec. 16, 2011, 8:55 p.m. |
| Registration Date |
Jan. 28, 2021, 4:39 p.m. |
| Last Update |
Nov. 21, 2024, 10:32 a.m. |
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0_build1011110331.18:*:*:*:*:*:*:* |
|
|
|
|
| execution environment |
| 1 |
cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:* |
| 2 |
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* |
Related information, measures and tools
Common Vulnerabilities List