ID

VAR-201112-0250


CVE

CVE-2011-4856


TITLE

Parallels Plesk Panel Design Error Vulnerability

Trust: 1.6

sources: IVD: 4d7d2506-2354-11e6-abef-000c29c66e3d // IVD: 7d7340df-463f-11e9-ae79-000c29342cb1 // CNVD: CNVD-2011-5608 // CNNVD: CNNVD-201112-341

DESCRIPTION

The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 sends incorrect Content-Type headers for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving admin/health/parameters and certain other files. NOTE: it is possible that only clients, not the Plesk product, could be affected by this issue. A remote attacker can cause an unexplained impact by exploiting an interpretation conflict that includes admin/health/parameters and some other file

Trust: 2.52

sources: NVD: CVE-2011-4856 // JVNDB: JVNDB-2011-003466 // CNVD: CNVD-2011-5608 // IVD: 4d7d2506-2354-11e6-abef-000c29c66e3d // IVD: 7d7340df-463f-11e9-ae79-000c29342cb1

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 1.0

sources: IVD: 4d7d2506-2354-11e6-abef-000c29c66e3d // IVD: 7d7340df-463f-11e9-ae79-000c29342cb1 // CNVD: CNVD-2011-5608

AFFECTED PRODUCTS

vendor:parallelsmodel:plesk panelscope:eqversion:10.4.4_build20111103.18

Trust: 2.4

vendor:parallelsmodel:plesk panelscope:eqversion:10.0

Trust: 0.6

vendor:parallels plesk panelmodel:10.4.4 build20111103.18scope: - version: -

Trust: 0.4

sources: IVD: 4d7d2506-2354-11e6-abef-000c29c66e3d // IVD: 7d7340df-463f-11e9-ae79-000c29342cb1 // CNVD: CNVD-2011-5608 // JVNDB: JVNDB-2011-003466 // CNNVD: CNNVD-201112-341 // NVD: CVE-2011-4856

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2011-4856
value: HIGH

Trust: 1.0

NVD: CVE-2011-4856
value: HIGH

Trust: 0.8

CNVD: CNVD-2011-5608
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201112-341
value: CRITICAL

Trust: 0.6

IVD: 4d7d2506-2354-11e6-abef-000c29c66e3d
value: CRITICAL

Trust: 0.2

IVD: 7d7340df-463f-11e9-ae79-000c29342cb1
value: CRITICAL

Trust: 0.2

nvd@nist.gov: CVE-2011-4856
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2011-5608
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

IVD: 4d7d2506-2354-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 7d7340df-463f-11e9-ae79-000c29342cb1
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: 4d7d2506-2354-11e6-abef-000c29c66e3d // IVD: 7d7340df-463f-11e9-ae79-000c29342cb1 // CNVD: CNVD-2011-5608 // JVNDB: JVNDB-2011-003466 // CNNVD: CNNVD-201112-341 // NVD: CVE-2011-4856

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-DesignError

Trust: 0.8

sources: JVNDB: JVNDB-2011-003466 // NVD: CVE-2011-4856

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201112-341

TYPE

Design error

Trust: 1.0

sources: IVD: 4d7d2506-2354-11e6-abef-000c29c66e3d // IVD: 7d7340df-463f-11e9-ae79-000c29342cb1 // CNNVD: CNNVD-201112-341

CONFIGURATIONS

sources: JVNDB: JVNDB-2011-003466

PATCH

title:Parallels Plesk Panelurl:http://www.parallels.com/products/plesk

Trust: 0.8

title:Parallels Plesk Panel design error vulnerability patchurl:https://www.cnvd.org.cn/patchInfo/show/37441

Trust: 0.6

sources: CNVD: CNVD-2011-5608 // JVNDB: JVNDB-2011-003466

EXTERNAL IDS

db:NVDid:CVE-2011-4856

Trust: 3.4

db:CNVDid:CNVD-2011-5608

Trust: 1.0

db:CNNVDid:CNNVD-201112-341

Trust: 1.0

db:JVNDBid:JVNDB-2011-003466

Trust: 0.8

db:XFid:72091

Trust: 0.6

db:IVDid:4D7D2506-2354-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:IVDid:7D7340DF-463F-11E9-AE79-000C29342CB1

Trust: 0.2

sources: IVD: 4d7d2506-2354-11e6-abef-000c29c66e3d // IVD: 7d7340df-463f-11e9-ae79-000c29342cb1 // CNVD: CNVD-2011-5608 // JVNDB: JVNDB-2011-003466 // CNNVD: CNNVD-201112-341 // NVD: CVE-2011-4856

REFERENCES

url:http://xss.cx/kb/parallels/xss-parallelspleskpanel.v10.4.4_build20111103.18-os_windows-2003-2008-reflected-cross-site-scripting-cwe79-capec86-javascript-injection-example-poc-report.html

Trust: 1.6

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/72091

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4856

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4856

Trust: 0.8

url:http://xforce.iss.net/xforce/xfdb/72091

Trust: 0.6

sources: CNVD: CNVD-2011-5608 // JVNDB: JVNDB-2011-003466 // CNNVD: CNNVD-201112-341 // NVD: CVE-2011-4856

SOURCES

db:IVDid:4d7d2506-2354-11e6-abef-000c29c66e3d
db:IVDid:7d7340df-463f-11e9-ae79-000c29342cb1
db:CNVDid:CNVD-2011-5608
db:JVNDBid:JVNDB-2011-003466
db:CNNVDid:CNNVD-201112-341
db:NVDid:CVE-2011-4856

LAST UPDATE DATE

2024-11-23T22:18:56.432000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2011-5608date:2011-12-19T00:00:00
db:JVNDBid:JVNDB-2011-003466date:2011-12-20T00:00:00
db:CNNVDid:CNNVD-201112-341date:2011-12-19T00:00:00
db:NVDid:CVE-2011-4856date:2024-11-21T01:33:07.680

SOURCES RELEASE DATE

db:IVDid:4d7d2506-2354-11e6-abef-000c29c66e3ddate:2011-12-19T00:00:00
db:IVDid:7d7340df-463f-11e9-ae79-000c29342cb1date:2011-12-19T00:00:00
db:CNVDid:CNVD-2011-5608date:2011-12-19T00:00:00
db:JVNDBid:JVNDB-2011-003466date:2011-12-20T00:00:00
db:CNNVDid:CNNVD-201112-341date:2011-12-19T00:00:00
db:NVDid:CVE-2011-4856date:2011-12-16T11:55:13.767