Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-35ch-vqm2-376r

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.

Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.

EPSS

Процентиль: 67%
0.00542
Низкий

Дефекты

CWE-200

Связанные уязвимости

CVSS3: 5.3
nvd
около 5 лет назад

Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.

EPSS

Процентиль: 67%
0.00542
Низкий

Дефекты

CWE-200