First published: Fri Dec 16 2011(Updated: )
Parallels Plesk Small Business Panel 10.2.0 does not include the HTTPOnly flag in a Set-Cookie header for a cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie, as demonstrated by cookies used by domains/sitebuilder_edit.php and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Parallels Plesk Small Business Panel | =10.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4756 has a moderate severity rating due to the potential for sensitive information leakage via script access.
To fix CVE-2011-4756, ensure that the HTTPOnly flag is set for cookies in the application configuration.
CVE-2011-4756 specifically affects Parallels Plesk Small Business Panel version 10.2.0.
CVE-2011-4756 facilitates cross-site scripting attacks by allowing remote attackers to access cookies without the HTTPOnly protection.
Yes, upgrading to a version of Parallels Plesk Small Business Panel that implements the HTTPOnly flag will mitigate the vulnerability.