Parallels Remote Application Server (RAS) 18 allows remote malicious users to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a "host" value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like "host":"192.168.###.###" in the POST data.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
parallels remote application server 18.0 |