First published: Fri Dec 16 2011(Updated: )
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 includes a submitted password within an HTTP response body, which allows remote attackers to obtain sensitive information by sniffing the network, as demonstrated by password handling in client@2/domain@1/odbc/dsn@1/properties/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.2.0_build20110407.20 | |
Microsoft Windows | ||
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4737 is considered a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2011-4737, upgrade to a later version of Parallels Plesk Panel that addresses this vulnerability.
CVE-2011-4737 enables attackers to sniff network traffic and potentially capture sensitive passwords sent in HTTP responses.
CVE-2011-4737 is found specifically in Parallels Plesk Panel version 10.2.0 build 20110407.20.
The impact of CVE-2011-4737 includes unauthorized access to sensitive information due to inadequate password protection in network communications.