Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.
References
Link | Resource |
---|---|
https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html | Exploit Third Party Advisory |
https://twitter.com/amadapa/status/1342407005110218753 | Third Party Advisory |
Configurations
Information
Published : 2020-12-25 11:15
Updated : 2020-12-30 08:00
NVD link : CVE-2020-35710
Mitre link : CVE-2020-35710
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
parallels
- remote_application_server