Vulnerability Description
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session, as demonstrated by cookies used by login_up.php3 and certain other files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Parallels | Parallels Plesk Panel | 10.2.0_build1011110331.18 |
| Microsoft | Windows | All versions |
| Redhat | Enterprise Linux | 6.0 |
Related Weaknesses (CWE)
References
- http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-101111033
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72331
- http://xss.cx/examples/plesk-reports/plesk-redhat-el6-psa-10.2.0-build-101111033
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72331
FAQ
What is CVE-2011-4728?
CVE-2011-4728 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture ...
How severe is CVE-2011-4728?
CVE-2011-4728 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-4728?
Check the references section above for vendor advisories and patch information. Affected products include: Parallels Parallels Plesk Panel, Microsoft Windows, Redhat Enterprise Linux.