ID

VAR-201112-0245


CVE

CVE-2011-4851


TITLE

Parallels Plesk Panel Trust Management Vulnerability

Trust: 1.6

sources: IVD: 4d2803dc-2354-11e6-abef-000c29c66e3d // IVD: 7d74c782-463f-11e9-ab3d-000c29342cb1 // CNVD: CNVD-2011-5613 // CNNVD: CNNVD-201112-336

DESCRIPTION

The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 generates a password form field without disabling the autocomplete feature, which makes it easier for remote attackers to bypass authentication by leveraging an unattended workstation, as demonstrated by forms in server/google-tools/ and certain other files. There is a vulnerability in Parallels Plesk Panel 10.4.4_build20111103.18, and the Control Panel is not disabled. The AutoComplete function generates a password form field

Trust: 2.52

sources: NVD: CVE-2011-4851 // JVNDB: JVNDB-2011-003461 // CNVD: CNVD-2011-5613 // IVD: 4d2803dc-2354-11e6-abef-000c29c66e3d // IVD: 7d74c782-463f-11e9-ab3d-000c29342cb1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 4d2803dc-2354-11e6-abef-000c29c66e3d // IVD: 7d74c782-463f-11e9-ab3d-000c29342cb1 // CNVD: CNVD-2011-5613

AFFECTED PRODUCTS

vendor:parallelsmodel:plesk panelscope:eqversion:10.4.4_build20111103.18

Trust: 2.4

vendor:parallelsmodel:plesk panelscope:eqversion:10.0

Trust: 0.6

vendor:parallels plesk panelmodel:10.4.4 build20111103.18scope: - version: -

Trust: 0.4

sources: IVD: 4d2803dc-2354-11e6-abef-000c29c66e3d // IVD: 7d74c782-463f-11e9-ab3d-000c29342cb1 // CNVD: CNVD-2011-5613 // JVNDB: JVNDB-2011-003461 // CNNVD: CNNVD-201112-336 // NVD: CVE-2011-4851

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4851
value: HIGH

Trust: 1.0

NVD: CVE-2011-4851
value: HIGH

Trust: 0.8

CNVD: CNVD-2011-5613
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201112-336
value: CRITICAL

Trust: 0.6

IVD: 4d2803dc-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 7d74c782-463f-11e9-ab3d-000c29342cb1
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2011-4851
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2011-5613
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 4d2803dc-2354-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d74c782-463f-11e9-ab3d-000c29342cb1
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 4d2803dc-2354-11e6-abef-000c29c66e3d // IVD: 7d74c782-463f-11e9-ab3d-000c29342cb1 // CNVD: CNVD-2011-5613 // JVNDB: JVNDB-2011-003461 // CNNVD: CNNVD-201112-336 // NVD: CVE-2011-4851

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.8

sources: JVNDB: JVNDB-2011-003461 // NVD: CVE-2011-4851

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201112-336

TYPE

Trust management

Trust: 1.0

sources: IVD: 4d2803dc-2354-11e6-abef-000c29c66e3d // IVD: 7d74c782-463f-11e9-ab3d-000c29342cb1 // CNNVD: CNNVD-201112-336

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003461

PATCH

title:Parallels Plesk Panelurl:http://www.parallels.com/products/plesk/

Trust: 0.8

title:Patch for Parallels Plesk Panel Trust Management Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/37446

Trust: 0.6

sources: CNVD: CNVD-2011-5613 // JVNDB: JVNDB-2011-003461

EXTERNAL IDS

db:NVDid:CVE-2011-4851

Trust: 3.4

db:CNVDid:CNVD-2011-5613

Trust: 1.0

db:CNNVDid:CNNVD-201112-336

Trust: 1.0

db:JVNDBid:JVNDB-2011-003461

Trust: 0.8

db:XFid:72226

Trust: 0.6

db:IVDid:4D2803DC-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D74C782-463F-11E9-AB3D-000C29342CB1

Trust: 0.2

sources: IVD: 4d2803dc-2354-11e6-abef-000c29c66e3d // IVD: 7d74c782-463f-11e9-ab3d-000c29342cb1 // CNVD: CNVD-2011-5613 // JVNDB: JVNDB-2011-003461 // CNNVD: CNNVD-201112-336 // NVD: CVE-2011-4851

REFERENCES

url:http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/72226

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4851

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4851

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/72226

Trust: 0.6

sources: CNVD: CNVD-2011-5613 // JVNDB: JVNDB-2011-003461 // CNNVD: CNNVD-201112-336 // NVD: CVE-2011-4851

SOURCES

db:IVDid:4d2803dc-2354-11e6-abef-000c29c66e3d
db:IVDid:7d74c782-463f-11e9-ab3d-000c29342cb1
db:CNVDid:CNVD-2011-5613
db:JVNDBid:JVNDB-2011-003461
db:CNNVDid:CNNVD-201112-336
db:NVDid:CVE-2011-4851

LAST UPDATE DATE

2024-11-23T22:39:14.929000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-5613date:2011-12-19T00:00:00
db:JVNDBid:JVNDB-2011-003461date:2011-12-20T00:00:00
db:CNNVDid:CNNVD-201112-336date:2011-12-19T00:00:00
db:NVDid:CVE-2011-4851date:2024-11-21T01:33:06.980

SOURCES RELEASE DATE

db:IVDid:4d2803dc-2354-11e6-abef-000c29c66e3ddate:2011-12-19T00:00:00
db:IVDid:7d74c782-463f-11e9-ab3d-000c29342cb1date:2011-12-19T00:00:00
db:CNVDid:CNVD-2011-5613date:2011-12-19T00:00:00
db:JVNDBid:JVNDB-2011-003461date:2011-12-20T00:00:00
db:CNNVDid:CNNVD-201112-336date:2011-12-19T00:00:00
db:NVDid:CVE-2011-4851date:2011-12-16T11:55:13.127