First published: Fri Dec 16 2011(Updated: )
The Server Administration Panel in Parallels Plesk Panel 10.2.0_build1011110331.18 omits the Content-Type header's charset parameter for certain resources, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving account/power-mode-logout and certain other files. NOTE: it is possible that only clients, not the Plesk product, could be affected by this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.2.0_build1011110331.18 | |
Microsoft Windows | ||
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4732 has a moderate severity rating due to potential unauthorized access caused by content-type interpretation conflicts.
To fix CVE-2011-4732, update the Parallels Plesk Panel to a version that includes the fix for the Content-Type header issue.
CVE-2011-4732 specifically affects Parallels Plesk Panel version 10.2.0_build1011110331.18.
CVE-2011-4732 does not specifically indicate a remote code execution vulnerability, but it may allow for other attacks if exploited.
Check your Parallels Plesk Panel version against the known affected version 10.2.0_build1011110331.18 to determine vulnerability.