CVE-2020-35710

Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:parallels:remote_application_server:18.0:*:*:*:*:*:*:*

History

30 Dec 2020, 16:00

Type Values Removed Values Added
References (MISC) https://twitter.com/amadapa/status/1342407005110218753 - (MISC) https://twitter.com/amadapa/status/1342407005110218753 - Third Party Advisory
References (MISC) https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html - (MISC) https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html - Exploit, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3
CWE CWE-200
CPE cpe:2.3:a:parallels:remote_application_server:18.0:*:*:*:*:*:*:*

Information

Published : 2020-12-25 19:15

Updated : 2023-12-10 13:41


NVD link : CVE-2020-35710

Mitre link : CVE-2020-35710

CVE.ORG link : CVE-2020-35710


JSON object : View

Products Affected

parallels

  • remote_application_server
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor