First published: Fri Dec 16 2011(Updated: )
The Control Panel in Parallels Plesk Panel 10.4.4_build20111103.18 does not ensure that Content-Type HTTP headers match the corresponding Content-Type data in HTML META elements, which might allow remote attackers to have an unspecified impact by leveraging an interpretation conflict involving the get_enabled_product_icon program. NOTE: it is possible that only clients, not the Plesk product, could be affected by this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Parallels Plesk Panel | =10.4.4_build20111103.18 | |
Microsoft Windows 2003 Server | ||
Microsoft Windows Server 2008 Itanium |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-4854 is characterized as a medium risk due to the potential for remote attacks via cross-site scripting vulnerabilities.
To fix CVE-2011-4854, update the Parallels Plesk Panel to a version that addresses this vulnerability.
CVE-2011-4854 could allow attackers to exploit reflected cross-site scripting vulnerabilities, leading to potential data theft or session hijacking.
CVE-2011-4854 specifically affects Parallels Plesk Panel version 10.4.4_build20111103.18.
CVE-2011-4854 is related to Parallels Plesk Panel and is not directly a vulnerability in Microsoft Windows Server.