CVE-2020-35710

Published: Dic 25, 2020 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2020-23368 Aliases: GSD-2020-35710
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,3
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: none
Availability: none
MEDIUM 5,0
Access Vector: network
Access Complexity: low
Authentication: none
Confidentiality: partial
Integrity: none
Availability: none

Description

AI Translation Available

Parallels Remote Application Server (RAS) 18 allows remote attackers to discover an intranet IP address because submission of the login form (even with blank credentials) provides this address to the attacker's client for use as a 'host' value. In other words, after an attacker's web browser sent a request to the login form, it would automatically send a second request to a RASHTML5Gateway/socket.io URI with something like 'host':'192.168.###.###' in the POST data.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0054
Percentile
0,7th
Updated

EPSS Score Trend (Last 91 Days)

200

Exposure of Sensitive Information to an Unauthorized Actor

Draft
Common Consequences
Security Scopes Affected:
Confidentiality
Potential Impacts:
Read Application Data
Applicable Platforms
Technologies: Mobile, Not Technology-Specific, Web Based
View CWE Details
Application

Remote Application Server by Parallels

cpe:2.3:a:parallels:remote_application_server:18.0:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://twitter.com/amadapa/status/1342407005110218753
https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html
https://twitter.com/amadapa/status/1342407005110218753
https://www.elladodelmal.com/2020/12/blue-team-red-team-como-parallels-ras.html