First published: Fri Dec 16 2011(Updated: )
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, as demonstrated by cookies used by login_up.php3 and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.2.0_build1011110331.18 | |
Microsoft Windows | ||
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4729 is considered a medium severity vulnerability due to its impact on sensitive cookie information.
To fix CVE-2011-4729, you should upgrade to a later version of Parallels Plesk Panel that includes the HTTPOnly flag in the Set-Cookie header.
CVE-2011-4729 can be exploited by remote attackers using cross-site scripting (XSS) to access sensitive information from cookies.
CVE-2011-4729 specifically affects Parallels Plesk Panel version 10.2.0_build1011110331.18.
No, CVE-2011-4729 is identified as a specific vulnerability only in Parallels Plesk Panel version 10.2.0_build1011110331.18.