Description
Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.
Published: 2020-12-25
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-23368 Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.
History

No history.

Subscriptions

Parallels Remote Application Server
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T17:09:15.165Z

Reserved: 2020-12-25T00:00:00.000Z

Link: CVE-2020-35710

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-12-25T19:15:13.177

Modified: 2024-11-21T05:27:53.670

Link: CVE-2020-35710

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses