First published: Fri Dec 25 2020(Updated: )
Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Parallels Remote Application Server | =18.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-35710.
The severity of CVE-2020-35710 is medium, with a severity score of 5.3.
CVE-2020-35710 allows remote attackers to discover an intranet IP address by exploiting a vulnerability in Parallels Remote Application Server (RAS) 18.
To mitigate CVE-2020-35710, it is recommended to update to the latest version of Parallels Remote Application Server (RAS) or apply the necessary patches provided by the vendor.
You can find more information about CVE-2020-35710 on the following references: [Reference 1](https://twitter.com/amadapa/status/1342407005110218753), [Reference 2](https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html).