First published: Fri Dec 16 2011(Updated: )
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 receives cleartext password input over HTTP, which allows remote attackers to obtain sensitive information by sniffing the network, as demonstrated by forms in login_up.php3 and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.2.0_build20110407.20 | |
Microsoft Windows | ||
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4736 is considered a medium severity vulnerability due to the risk of sensitive information exposure.
To fix CVE-2011-4736, implement HTTPS to encrypt data transmitted over the network.
CVE-2011-4736 affects users of Parallels Plesk Panel version 10.2.0 build 20110407.20.
CVE-2011-4736 can be exploited through network sniffing attacks to capture cleartext passwords.
CVE-2011-4736 was reported in 2011, specifically in version 10.2.0 build 20110407.20 of Parallels Plesk Panel.