René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

95 lines
3.1 KiB
JSON

{
"id": "CVE-2011-4749",
"sourceIdentifier": "cve@mitre.org",
"published": "2011-12-16T11:55:10.847",
"lastModified": "2019-04-22T17:48:00.643",
"vulnStatus": "Modified",
"descriptions": [
{
"lang": "en",
"value": "The billing system for Parallels Plesk Panel 10.3.1_build1013110726.09 generates a password form field without disabling the autocomplete feature, which makes it easier for remote attackers to bypass authentication by leveraging an unattended workstation, as demonstrated by forms on certain pages under admin/index.php/default."
},
{
"lang": "es",
"value": "El sistema de tarificaci\u00f3n de Parallels Plesk Panel 10.3.1_build1013110726.09 genera un campo de formulario de contrase\u00f1a sin deshabilitar la opci\u00f3n de autocompletado, lo que facilita a atacantes remotos evitar la autenticaci\u00f3n accediendo a un ordenador desatendido, tal como se ha demostrado con formularios en determinadas p\u00e1ginas web bajo admin/index.php/default."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-255"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1_build1013110726.09:*:*:*:*:*:*:*",
"matchCriteriaId": "6A3EBF0D-6DE3-4144-ADF0-48D2F58D2E41"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC"
}
]
}
]
}
],
"references": [
{
"url": "http://xss.cx/examples/plesk-reports/plesk-parallels-controlpanel-psa.v.10.3.1_build1013110726.09%20os_redhat.el6-billing-system-plugin-javascript-injection-example-poc-report.html",
"source": "cve@mitre.org"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72260",
"source": "cve@mitre.org"
}
]
}