First published: Fri Dec 16 2011(Updated: )
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 does not set the secure flag for a cookie in an https session, which makes it easier for remote attackers to capture this cookie by intercepting its transmission within an http session, as demonstrated by cookies used by help.php and certain other files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =10.4.4_build20111103.18 | |
Microsoft Windows Server 2003 | ||
Microsoft Windows Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4849 is considered a moderate severity vulnerability due to its potential to allow remote attackers to capture cookies.
To fix CVE-2011-4849, ensure that the secure flag is set for cookies in secure HTTPS sessions in the Parallels Plesk Panel configuration.
CVE-2011-4849 specifically affects Parallels Plesk Panel version 10.4.4_build20111103.18.
CVE-2011-4849 may expose user session cookies to interception, which can lead to session hijacking.
Yes, CVE-2011-4849 poses a risk of exploitation, particularly in environments where HTTP traffic can be monitored by attackers.