First published: Fri Dec 16 2011(Updated: )
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session, as demonstrated by cookies used by login_up.php3 and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.2.0_build1011110331.18 | |
Microsoft Windows | ||
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4728 is classified as a medium severity vulnerability due to the potential for cookie interception in HTTPS sessions.
To address CVE-2011-4728, ensure that the secure flag is set for cookies in your server configuration.
CVE-2011-4728 specifically affects Parallels Plesk Panel version 10.2.0_build1011110331.18.
Yes, CVE-2011-4728 can be exploited remotely by attackers who intercept cookie transmissions.
CVE-2011-4728 enables session hijacking by allowing attackers to capture unprotected cookies.