ID

VAR-201203-0121


CVE

CVE-2012-1557


TITLE

Parallels Plesk Panel of admin/plib/api-rpc/Agent.php In SQL Injection vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2012-001738

DESCRIPTION

SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in March 2012. Parallels Plesk is a server virtualization automation solution. Parallels Plesk has a security vulnerability that allows anonymous attackers to authenticate and remotely invade Plesk servers without allowing unauthorized access to and modification of the server. Attackers can exploit this issue to perform unauthorized actions on the affected application. Successfully exploiting this issue results in complete compromise of the application. Limited technical details are available at this time. We will update this BID as more information emerges. Parallels Plesk Panel versions 7.6.1 through 10.3.1 are vulnerable. ---------------------------------------------------------------------- Become a PSI 3.0 beta tester! Test-drive the new beta version and tell us what you think about its extended automatic update function and significantly enhanced user-interface. Download it here! http://secunia.com/psi_30_beta_launch ---------------------------------------------------------------------- TITLE: Parallels Plesk Panel Unspecified SQL Injection Vulnerability SECUNIA ADVISORY ID: SA48262 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/48262/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=48262 RELEASE DATE: 2012-03-05 DISCUSS ADVISORY: http://secunia.com/advisories/48262/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/48262/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=48262 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A vulnerability has been reported in Parallels Plesk Panel, which can be exploited by malicious people to conduct SQL injection attacks. Certain unspecified input passed to admin/plib/api-rpc/Agent.php is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code. Please see the vendor's advisory for a list of affected versions. SOLUTION: Update to a fixed version (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: http://kb.parallels.com/en/113321 http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-linux-updates-release-notes.html#10216 http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-windows-updates-release-notes.html#10216 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.7

sources: NVD: CVE-2012-1557 // JVNDB: JVNDB-2012-001738 // CNVD: CNVD-2012-1029 // BID: 52267 // IVD: ab255994-1f71-11e6-abef-000c29c66e3d // PACKETSTORM: 110454

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.8

sources: IVD: ab255994-1f71-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1029

AFFECTED PRODUCTS

vendor:parallelsmodel:plesk panelscope:eqversion:10.3.1

Trust: 2.5

vendor:parallels plesk panelmodel: - scope:eqversion:10.2.0

Trust: 2.2

vendor:parallels plesk panelmodel: - scope:eqversion:10.1.1

Trust: 2.0

vendor:parallelsmodel:plesk panelscope:eqversion:7.6.1

Trust: 1.9

vendor:parallelsmodel:plesk panelscope:eqversion:8.6

Trust: 1.9

vendor:parallelsmodel:plesk panelscope:eqversion:9.3

Trust: 1.9

vendor:parallelsmodel:plesk panelscope:eqversion:9.5

Trust: 1.9

vendor:parallelsmodel:plesk panelscope:eqversion:10.2.0

Trust: 1.6

vendor:parallels plesk panelmodel: - scope:eqversion:10.0.1

Trust: 1.2

vendor:parallelsmodel:plesk panelscope:eqversion:10.1.1

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:9.2

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:7.0

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:8.1

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:8.4

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:9.0

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:9.5.4

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:8.0

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:8.3

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:10.0.1

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:8.2

Trust: 1.0

vendor:parallelsmodel:plesk panelscope:eqversion:10.0

Trust: 0.9

vendor:parallelsmodel:plesk panelscope:eqversion:10.1

Trust: 0.9

vendor:parallelsmodel:plesk panelscope:eqversion:10.2

Trust: 0.9

vendor:parallelsmodel:plesk panelscope:eqversion:10.3

Trust: 0.9

vendor:parallelsmodel:plesk panelscope:eqversion:10.0.1 mu#13

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:ltversion:8.x

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:10.3.1 mu#5

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:10.1.1 mu#22

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:ltversion:10.2.x

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:8.6 mu#2

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:ltversion:9.x

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:ltversion:10.1.x

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:9.5 mu#11

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:10.2.0 mu#16

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:ltversion:10.0.x

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:ltversion:10.3.x

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:7.x

Trust: 0.8

vendor:parallels plesk panelmodel: - scope:eqversion:10.3.1

Trust: 0.6

vendor:parallels plesk panelmodel: - scope:eqversion:7.0

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:7.6.1

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:8.0

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:8.1

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:8.2

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:8.3

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:8.4

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:8.6

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:9.0

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:9.2

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:9.3

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:9.5

Trust: 0.2

vendor:parallels plesk panelmodel: - scope:eqversion:9.5.4

Trust: 0.2

sources: IVD: ab255994-1f71-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1029 // BID: 52267 // JVNDB: JVNDB-2012-001738 // CNNVD: CNNVD-201203-211 // NVD: CVE-2012-1557

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-1557
value: HIGH

Trust: 1.0

NVD: CVE-2012-1557
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201203-211
value: HIGH

Trust: 0.6

IVD: ab255994-1f71-11e6-abef-000c29c66e3d
value: HIGH

Trust: 0.2

nvd@nist.gov: CVE-2012-1557
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

IVD: ab255994-1f71-11e6-abef-000c29c66e3d
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

sources: IVD: ab255994-1f71-11e6-abef-000c29c66e3d // JVNDB: JVNDB-2012-001738 // CNNVD: CNNVD-201203-211 // NVD: CVE-2012-1557

PROBLEMTYPE DATA

problemtype:CWE-89

Trust: 1.8

sources: JVNDB: JVNDB-2012-001738 // NVD: CVE-2012-1557

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201203-211

TYPE

SQL injection

Trust: 0.9

sources: IVD: ab255994-1f71-11e6-abef-000c29c66e3d // PACKETSTORM: 110454 // CNNVD: CNNVD-201203-211

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-001738

PATCH

title:記事 ID: 113321url:http://kb.parallels.com/en/113321

Trust: 0.8

title:Parallels Plesk Panel has patches for unknown remote vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/11892

Trust: 0.6

sources: CNVD: CNVD-2012-1029 // JVNDB: JVNDB-2012-001738

EXTERNAL IDS

db:NVDid:CVE-2012-1557

Trust: 2.9

db:BIDid:52267

Trust: 2.5

db:SECUNIAid:48262

Trust: 1.7

db:OPENWALLid:OSS-SECURITY/2012/03/08/3

Trust: 1.6

db:OSVDBid:79769

Trust: 1.6

db:SECTRACKid:1026760

Trust: 1.0

db:CNVDid:CNVD-2012-1029

Trust: 0.8

db:CNNVDid:CNNVD-201203-211

Trust: 0.8

db:JVNDBid:JVNDB-2012-001738

Trust: 0.8

db:MLISTid:[OSS-SECURITY] 20120308 CVE-REQUEST: PARALLELS PLESK PANEL ADMIN/PLIB/API-RPC/AGENT.PHP UNSPECIFIED SQL INJECTION

Trust: 0.6

db:IVDid:AB255994-1F71-11E6-ABEF-000C29C66E3D

Trust: 0.2

db:PACKETSTORMid:110454

Trust: 0.1

sources: IVD: ab255994-1f71-11e6-abef-000c29c66e3d // CNVD: CNVD-2012-1029 // BID: 52267 // JVNDB: JVNDB-2012-001738 // PACKETSTORM: 110454 // CNNVD: CNNVD-201203-211 // NVD: CVE-2012-1557

REFERENCES

url:http://kb.parallels.com/en/113321

Trust: 2.6

url:http://download1.parallels.com/plesk/pp10/parallels-plesk-panel-10-linux-updates-release-notes.html#10216

Trust: 1.7

url:http://download1.parallels.com/plesk/pp10/parallels-plesk-panel-10-windows-updates-release-notes.html#10216

Trust: 1.7

url:http://www.securityfocus.com/bid/52267

Trust: 1.6

url:http://www.osvdb.org/79769

Trust: 1.6

url:http://www.openwall.com/lists/oss-security/2012/03/08/3

Trust: 1.6

url:http://www.h-online.com/security/news/item/bug-in-plesk-administration-software-is-being-actively-exploited-1446587.html

Trust: 1.6

url:http://www.cert.fi/haavoittuvuudet/2012/haavoittuvuus-2012-035.html

Trust: 1.6

url:http://secunia.com/advisories/48262

Trust: 1.6

url:http://www.securitytracker.com/id?1026760

Trust: 1.0

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/73628

Trust: 1.0

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-1557

Trust: 0.8

url:https://www.jpcert.or.jp/at/2013/at130018.txt

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-1557

Trust: 0.8

url:http://blogs.cisco.com/security/apache-darkleech-compromises/

Trust: 0.8

url:http://malwaremustdie.blogspot.jp/2013/03/the-evil-came-back-darkleechs-apache.html

Trust: 0.8

url:http://www.parallels.com/products/plesk/

Trust: 0.3

url:http://secunia.com/psi_30_beta_launch

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/48262/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/48262/

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=48262

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2012-1029 // BID: 52267 // JVNDB: JVNDB-2012-001738 // PACKETSTORM: 110454 // CNNVD: CNNVD-201203-211 // NVD: CVE-2012-1557

CREDITS

Reported by the vendor.

Trust: 0.3

sources: BID: 52267

SOURCES

db:IVDid:ab255994-1f71-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2012-1029
db:BIDid:52267
db:JVNDBid:JVNDB-2012-001738
db:PACKETSTORMid:110454
db:CNNVDid:CNNVD-201203-211
db:NVDid:CVE-2012-1557

LAST UPDATE DATE

2024-11-23T22:39:14.319000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-1029date:2012-03-06T00:00:00
db:BIDid:52267date:2015-03-08T16:04:00
db:JVNDBid:JVNDB-2012-001738date:2012-03-14T00:00:00
db:CNNVDid:CNNVD-201203-211date:2012-03-13T00:00:00
db:NVDid:CVE-2012-1557date:2024-11-21T01:37:12.537

SOURCES RELEASE DATE

db:IVDid:ab255994-1f71-11e6-abef-000c29c66e3ddate:2012-03-06T00:00:00
db:CNVDid:CNVD-2012-1029date:2012-03-06T00:00:00
db:BIDid:52267date:2012-03-02T00:00:00
db:JVNDBid:JVNDB-2012-001738date:2012-03-14T00:00:00
db:PACKETSTORMid:110454date:2012-03-05T04:34:36
db:CNNVDid:CNNVD-201203-211date:2012-03-13T00:00:00
db:NVDid:CVE-2012-1557date:2012-03-12T19:55:01.417