logo
DATABASE RESOURCES PRICING ABOUT US

Parallels Plesk Panel phppath/php vulnerability

Description

### Overview Parallels Plesk Panel versions 9.0 - 9.2.3 on Linux platforms are vulnerable to remote code execution. ### Description Parallels Plesk Panel versions 9.0 - 9.2.3 on Linux platforms may be exploited by a combination of [CVE-2012-1823](<https://vulners.com/cve/CVE-2012-1823>) and the Plesk phppath script alias usage. There have been reports that this vulnerability is being exploited in the wild. --- ### Impact A remote unauthenticated attacker may be able to run arbitrary code under the context of the web server user. --- ### Solution **Apply an Update** Parallels Plesk Panel 9.0 - 9.2.3 have been considered [end-of-life](<http://www.parallels.com/products/plesk/lifecycle>) software for over 3 years. Users should upgrade to at least 9.5.4 or later. Parallels will provide additional workaround mitigations in[ Knowledge base article 116241](<http://kb.parallels.com/116241>) soon. Please consider the following workarounds if you are unable to upgrade. --- **Update PHP** [Update PHP](<http://www.php.net/archive/2012.php#id2012-05-03-1>) to protect against CVE-2012-1823. **Restrict Access** Do not allow untrusted networks to connect to the Plesk Panel. --- ### Vendor Information 673343 Filter by status: All Affected Not Affected Unknown Filter by content: __ Additional information available __ Sort by: Status Alphabetical Expand all **Javascript is disabled. Click here to view vendors.** ### Parallels Holdings Ltd Affected Notified: June 06, 2013 Updated: June 07, 2013 ### Status Affected ### Vendor Statement We have not received a statement from the vendor. ### Vendor Information We are not aware of further vendor information regarding this vulnerability. ### CVSS Metrics Group | Score | Vector ---|---|--- Base | 7.5 | AV:N/AC:L/Au:N/C:P/I:P/A:P Temporal | 6.5 | E:H/RL:OF/RC:C Environmental | 4.9 | CDP:ND/TD:M/CR:ND/IR:ND/AR:ND ### References * <http://kb.parallels.com/116241> * <http://kb.parallels.com/en/113818> * <http://www.parallels.com/products/plesk/lifecycle> * <http://seclists.org/fulldisclosure/2013/Jun/21> * <http://blogs.cisco.com/security/plesk-0-day-targets-web-servers/> * <http://kb.parallels.com/en/113814> * <http://www.php.net/archive/2012.php#id2012-05-03-1> * <https://vulners.com/cve/CVE-2012-1823> ### Acknowledgements Kingcope published an exploit for this vulnerability to the Full Disclosure mailing list. This document was written by Jared Allar. ### Other Information **CVE IDs:** | [CVE-2012-1823](<http://web.nvd.nist.gov/vuln/detail/CVE-2012-1823>) ---|--- **Date Public:** | 2013-06-05 **Date First Published:** | 2013-06-07 **Date Last Updated: ** | 2013-06-07 16:19 UTC **Document Revision: ** | 16


Related