Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security

Hacker Publishes Alleged Zero-Day Exploit For Plesk 42

hypnosec writes "KingCope, known for many concrete zero-day exploits, has published yet another zero-day through full disclosure – this time for Plesk, a hosting software package made by Parallels and used on thousands of servers across the web. According to KingCope, Plesk versions 9.5.4, 9.3, 9.2, 9.0 and 9.6 on three different Linux variants Red Hat, CentOS and Fedora are vulnerable to the hack. The exploit, as noted by the hacker, makes use of specially crafted HTTP queries that inject PHP commands. The exploit uses POST request to launch a PHP interpreter and the attacker can set any configuration parameters through the POST request. Once invoked, the interpreter can be used to execute arbitrary commands."
This discussion has been archived. No new comments can be posted.

Hacker Publishes Alleged Zero-Day Exploit For Plesk

Comments Filter:
  • little late (Score:5, Informative)

    by Anonymous Coward on Thursday June 06, 2013 @01:37PM (#43927447)

    plesk is currently in ver 11... this would have been big like 2 years ago.

  • by Parallels ( 2943753 ) on Thursday June 06, 2013 @03:30PM (#43928803)
    This vulnerability is a variation of the long known CVE-2012-1823 vulnerability related to the CGI mode of PHP only in older Plesks. All currently supported versions of Parallels Plesk Panel 9.5, 10.x and 11.x, as well Parallels Plesk Automation, are not vulnerable. If a customer is using legacy, and a no longer supported version of Parallels Plesk Panel, they should upgrade to the latest version. For the legacy versions of Parallels Plesk Panel, we provided a suggested and unsupported workaround described in http://kb.parallels.com/en/113818 [parallels.com].

If you want to put yourself on the map, publish your own map.

Working...