ID

VAR-201112-0248


CVE

CVE-2011-4854


TITLE

Parallels Plesk Panel Design Error Vulnerability

Trust: 1.6

sources: IVD: 4d965cba-2354-11e6-abef-000c29c66e3d // IVD: 7d753cb0-463f-11e9-bb26-000c29342cb1 // CNVD: CNVD-2011-5610 // CNNVD: CNNVD-201112-339

DESCRIPTION

The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 does not ensure that Content-Type HTTP headers match the corresponding Content-Type data in HTML META elements, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving the get_enabled_product_icon program. NOTE: it is possible that only clients, not the Plesk product, could be affected by this issue. A remote attacker can cause an unexplained impact by exploiting an interpretation conflict that includes the get_enabled_product_icon program

Trust: 2.52

sources: NVD: CVE-2011-4854 // JVNDB: JVNDB-2011-003464 // CNVD: CNVD-2011-5610 // IVD: 4d965cba-2354-11e6-abef-000c29c66e3d // IVD: 7d753cb0-463f-11e9-bb26-000c29342cb1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 4d965cba-2354-11e6-abef-000c29c66e3d // IVD: 7d753cb0-463f-11e9-bb26-000c29342cb1 // CNVD: CNVD-2011-5610

AFFECTED PRODUCTS

vendor:parallelsmodel:plesk panelscope:eqversion:10.4.4_build20111103.18

Trust: 2.4

vendor:parallelsmodel:plesk panelscope:eqversion:10.0

Trust: 0.6

vendor:parallels plesk panelmodel:10.4.4 build20111103.18scope: - version: -

Trust: 0.4

sources: IVD: 4d965cba-2354-11e6-abef-000c29c66e3d // IVD: 7d753cb0-463f-11e9-bb26-000c29342cb1 // CNVD: CNVD-2011-5610 // JVNDB: JVNDB-2011-003464 // CNNVD: CNNVD-201112-339 // NVD: CVE-2011-4854

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4854
value: HIGH

Trust: 1.0

NVD: CVE-2011-4854
value: HIGH

Trust: 0.8

CNVD: CNVD-2011-5610
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201112-339
value: CRITICAL

Trust: 0.6

IVD: 4d965cba-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 7d753cb0-463f-11e9-bb26-000c29342cb1
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2011-4854
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2011-5610
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 4d965cba-2354-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d753cb0-463f-11e9-bb26-000c29342cb1
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 4d965cba-2354-11e6-abef-000c29c66e3d // IVD: 7d753cb0-463f-11e9-bb26-000c29342cb1 // CNVD: CNVD-2011-5610 // JVNDB: JVNDB-2011-003464 // CNNVD: CNNVD-201112-339 // NVD: CVE-2011-4854

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2011-003464 // NVD: CVE-2011-4854

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201112-339

TYPE

Design error

Trust: 1.0

sources: IVD: 4d965cba-2354-11e6-abef-000c29c66e3d // IVD: 7d753cb0-463f-11e9-bb26-000c29342cb1 // CNNVD: CNNVD-201112-339

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003464

PATCH

title:Parallels Plesk Panelurl:http://www.parallels.com/products/plesk/

Trust: 0.8

title:Parallels Plesk Panel design error vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/37443

Trust: 0.6

sources: CNVD: CNVD-2011-5610 // JVNDB: JVNDB-2011-003464

EXTERNAL IDS

db:NVDid:CVE-2011-4854

Trust: 3.4

db:CNVDid:CNVD-2011-5610

Trust: 1.0

db:CNNVDid:CNNVD-201112-339

Trust: 1.0

db:JVNDBid:JVNDB-2011-003464

Trust: 0.8

db:XFid:72093

Trust: 0.6

db:IVDid:4D965CBA-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D753CB0-463F-11E9-BB26-000C29342CB1

Trust: 0.2

sources: IVD: 4d965cba-2354-11e6-abef-000c29c66e3d // IVD: 7d753cb0-463f-11e9-bb26-000c29342cb1 // CNVD: CNVD-2011-5610 // JVNDB: JVNDB-2011-003464 // CNNVD: CNNVD-201112-339 // NVD: CVE-2011-4854

REFERENCES

url:http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/72093

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4854

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4854

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/72093

Trust: 0.6

sources: CNVD: CNVD-2011-5610 // JVNDB: JVNDB-2011-003464 // CNNVD: CNNVD-201112-339 // NVD: CVE-2011-4854

SOURCES

db:IVDid:4d965cba-2354-11e6-abef-000c29c66e3d
db:IVDid:7d753cb0-463f-11e9-bb26-000c29342cb1
db:CNVDid:CNVD-2011-5610
db:JVNDBid:JVNDB-2011-003464
db:CNNVDid:CNNVD-201112-339
db:NVDid:CVE-2011-4854

LAST UPDATE DATE

2024-11-23T22:08:53.503000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-5610date:2011-12-19T00:00:00
db:JVNDBid:JVNDB-2011-003464date:2011-12-20T00:00:00
db:CNNVDid:CNNVD-201112-339date:2011-12-19T00:00:00
db:NVDid:CVE-2011-4854date:2024-11-21T01:33:07.397

SOURCES RELEASE DATE

db:IVDid:4d965cba-2354-11e6-abef-000c29c66e3ddate:2011-12-19T00:00:00
db:IVDid:7d753cb0-463f-11e9-bb26-000c29342cb1date:2011-12-19T00:00:00
db:CNVDid:CNVD-2011-5610date:2011-12-19T00:00:00
db:JVNDBid:JVNDB-2011-003464date:2011-12-20T00:00:00
db:CNNVDid:CNNVD-201112-339date:2011-12-19T00:00:00
db:NVDid:CVE-2011-4854date:2011-12-16T11:55:13.437