The Web Client of Parallels Remote Application Server v18.0 is vulnerable to Host Header Injection attacks. This vulnerability allows attackers to execute arbitrary commands via a crafted payload injected into the Host header.
References
Link | Resource |
---|---|
https://github.com/IthacaLabs/Parallels/blob/main/ParallelsRemoteApplicationServer/HHI_CVE-2022-40870.txt | Exploit Third Party Advisory |
https://github.com/IthacaLabs/Parallels/tree/main/ParallelsRemoteApplicationServer | Exploit Third Party Advisory |
Configurations
History
26 Nov 2022, 03:33
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:parallels:remote_application_server:18.0:*:*:*:*:*:*:* | |
First Time |
Parallels
Parallels remote Application Server |
|
CWE | CWE-116 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
References | (MISC) https://github.com/IthacaLabs/Parallels/tree/main/ParallelsRemoteApplicationServer - Exploit, Third Party Advisory | |
References | (MISC) https://github.com/IthacaLabs/Parallels/blob/main/ParallelsRemoteApplicationServer/HHI_CVE-2022-40870.txt - Exploit, Third Party Advisory |
23 Nov 2022, 00:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-11-23 00:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-40870
Mitre link : CVE-2022-40870
CVE.ORG link : CVE-2022-40870
JSON object : View
Products Affected
parallels
- remote_application_server
CWE
CWE-116
Improper Encoding or Escaping of Output