First published: Fri Dec 16 2011(Updated: )
The Control Panel in Parallels Plesk Panel 10.2.0 build 20110407.20 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, as demonstrated by cookies used by get_password.php and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.2.0_build20110407.20 | |
Microsoft Windows | ||
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4738 is categorized with a moderate severity level due to its potential to expose sensitive information through cookie access.
To mitigate CVE-2011-4738, ensure that the HTTPOnly flag is set for all cookies in the Parallels Plesk Panel configurations.
CVE-2011-4738 specifically affects Parallels Plesk Panel version 10.2.0 build 20110407.20.
Yes, remote attackers can exploit CVE-2011-4738 to gain access to sensitive information through script access to unprotected cookies.
CVE-2011-4738 is classified as an HTTPOnly cookie vulnerability that may lead to cross-site scripting issues.