First published: Fri Dec 16 2011(Updated: )
Parallels Plesk Small Business Panel 10.2.0 receives cleartext password input over HTTP, which allows remote attackers to obtain sensitive information by sniffing the network, as demonstrated by forms in smb/auth and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Parallels Plesk Small Business Panel | =10.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4758 is considered a high-severity vulnerability due to the potential for exposure of sensitive data.
To fix CVE-2011-4758, upgrade Parallels Plesk Small Business Panel to a version that supports HTTPS to protect password transmissions.
CVE-2011-4758 allows attackers to intercept and obtain cleartext passwords and other sensitive information transmitted over HTTP.
CVE-2011-4758 affects users of Parallels Plesk Small Business Panel version 10.2.0.
CVE-2011-4758 exploits the transmission of cleartext password inputs over HTTP, making them vulnerable to network sniffing.