Parallels Plesk Panel Arbitrary PHP Code Execution Vulnerability
Last Update Date:
10 Jun 2013
Release Date:
7 Jun 2013
4143
Views
RISK: High Risk
TYPE: Servers - Network Management
A vulnerability has been identified in Parallels Plesk Panel, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an unspecified error and can be exploited to execute arbitrary PHP code.
Successful exploitation requires a ScriptAlias for the php path using Apache's mod_alias.
Impact
- Remote Code Execution
System / Technologies affected
- Parallels Plesk Panel 9.x
- Plesk 8.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to the latest version of Plesk (version 11.5)
- Update PHP to protect against CVE-2012-1823 vulnerability
http://kb.parallels.com/116241 - Do not allow untrusted networks to connect to the Plesk Panel.
Vulnerability Identifier
Source
Related Link
Share with