First published: Fri Dec 16 2011(Updated: )
The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 has web pages containing e-mail addresses that are not intended for correspondence about the local application deployment, which allows remote attackers to obtain potentially sensitive information by reading a page, as demonstrated by js/ajax/core/ajax.inc.js and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.3.1_build1013110726.09 | |
Red Hat Enterprise Linux | =6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4748 has a CVSS score indicating moderate severity due to its ability to expose potentially sensitive information.
To fix CVE-2011-4748, it is recommended to upgrade to a newer version of Parallels Plesk Panel that addresses this vulnerability.
CVE-2011-4748 potentially exposes email addresses from web pages intended for internal use, which can lead to sensitive data leakage.
CVE-2011-4748 affects Parallels Plesk Panel version 10.3.1_build1013110726.09.
Red Hat Enterprise Linux 6.0 is not vulnerable itself, but it can host affected versions of Parallels Plesk Panel, which may expose vulnerabilities.