First published: Fri Dec 16 2011(Updated: )
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 does not properly validate string data that is intended for storage in an XML document, which allows remote attackers to cause a denial of service (parsing error) or possibly have unspecified other impact via a crafted REST URL parameter, as demonstrated by parameters to admin/ and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.2.0_build1011110331.18 | |
Microsoft Windows | ||
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4727 has a high severity rating due to its potential to cause denial of service and other unspecified impacts.
To mitigate CVE-2011-4727, upgrade Parallels Plesk Panel to a version that addresses this vulnerability.
CVE-2011-4727 can be exploited through improper validation of string data in an XML document leading to parsing errors.
CVE-2011-4727 specifically affects Parallels Plesk Panel version 10.2.0_build1011110331.18.
While primarily leading to denial of service, CVE-2011-4727 could also potentially result in other unspecified impacts, including data exposure.