ID

VAR-201304-0136


CVE

CVE-2013-0132


TITLE

Plesk Panel 11.0.9 privilege escalation vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#310500

DESCRIPTION

The suexec implementation in Parallels Plesk Panel 11.0.9 contains a cgi-wrapper whitelist entry, which allows user-assisted remote attackers to execute arbitrary PHP code via a request containing crafted environment variables. Plesk Panel 11.0.9 and possibly earlier versions contains multiple privilege escalation vulnerabilities. Parallels Plesk Panel is a web hosting control panel with integrated web design, SaaS marketplace and payment system. The Plesk / usr / sbin / suexec program (the program may be unknown elsewhere, but the file name is always suexec) allows CGI wrappers (cgi-wrapper) to be called to bypass restrictions on file ownership. Parallels Plesk Panel is prone to a local security-bypass vulnerability. Local attackers can exploit this issue to bypass certain security restrictions and perform unauthorized actions

Trust: 3.15

sources: NVD: CVE-2013-0132 // CERT/CC: VU#310500 // JVNDB: JVNDB-2013-002404 // CNVD: CNVD-2013-03025 // BID: 59020

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-03025

AFFECTED PRODUCTS

vendor:parallelsmodel:plesk panelscope:eqversion:11.0.9

Trust: 1.9

vendor:parallels holdingsmodel: - scope: - version: -

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:10.x for linux

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:11.x for linux

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:8.x for linux/unix

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:9.x for linux/unix

Trust: 0.8

vendor:parallelsmodel:holdings ltd plesk panelscope:eqversion:11.0.9

Trust: 0.6

sources: CERT/CC: VU#310500 // CNVD: CNVD-2013-03025 // BID: 59020 // JVNDB: JVNDB-2013-002404 // CNNVD: CNNVD-201304-168 // NVD: CVE-2013-0132

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-0132
value: MEDIUM

Trust: 1.0

NVD: CVE-2013-0132
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2013-03025
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201304-168
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2013-0132
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-03025
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:S/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.7
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2013-03025 // JVNDB: JVNDB-2013-002404 // CNNVD: CNNVD-201304-168 // NVD: CVE-2013-0132

PROBLEMTYPE DATA

problemtype:CWE-94

Trust: 1.8

sources: JVNDB: JVNDB-2013-002404 // NVD: CVE-2013-0132

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201304-168

TYPE

code injection

Trust: 0.6

sources: CNNVD: CNNVD-201304-168

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002404

PATCH

title:記事 ID: 115942 脆弱性に関する問題 VU#310500、CVE-2013-0132、CVE-2013-0133url:http://kb.parallels.com/jp/115942/

Trust: 0.8

title:Parallels Plesk Panelurl:http://www.parallels.com/jp/products/plesk/

Trust: 0.8

sources: JVNDB: JVNDB-2013-002404

EXTERNAL IDS

db:CERT/CCid:VU#310500

Trust: 4.1

db:NVDid:CVE-2013-0132

Trust: 3.3

db:BIDid:59020

Trust: 1.5

db:JVNid:JVNVU94324985

Trust: 0.8

db:JVNDBid:JVNDB-2013-002404

Trust: 0.8

db:CNVDid:CNVD-2013-03025

Trust: 0.6

db:SECUNIAid:52998

Trust: 0.6

db:CNNVDid:CNNVD-201304-168

Trust: 0.6

sources: CERT/CC: VU#310500 // CNVD: CNVD-2013-03025 // BID: 59020 // JVNDB: JVNDB-2013-002404 // CNNVD: CNNVD-201304-168 // NVD: CVE-2013-0132

REFERENCES

url:http://www.kb.cert.org/vuls/id/310500

Trust: 3.3

url:http://kb.parallels.com/115942

Trust: 1.6

url:http://www.parallels.com/products/plesk/

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0132

Trust: 0.8

url:http://jvn.jp/cert/jvnvu94324985/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0132

Trust: 0.8

url:http://secunia.com/advisories/52998

Trust: 0.6

url:http://www.securityfocus.com/bid/59020

Trust: 0.6

sources: CERT/CC: VU#310500 // CNVD: CNVD-2013-03025 // BID: 59020 // JVNDB: JVNDB-2013-002404 // CNNVD: CNNVD-201304-168 // NVD: CVE-2013-0132

CREDITS

Ronald Volgers of Pine Digital Security

Trust: 0.9

sources: BID: 59020 // CNNVD: CNNVD-201304-168

SOURCES

db:CERT/CCid:VU#310500
db:CNVDid:CNVD-2013-03025
db:BIDid:59020
db:JVNDBid:JVNDB-2013-002404
db:CNNVDid:CNNVD-201304-168
db:NVDid:CVE-2013-0132

LAST UPDATE DATE

2024-11-23T22:39:06.049000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#310500date:2014-07-30T00:00:00
db:CNVDid:CNVD-2013-03025date:2013-04-23T00:00:00
db:BIDid:59020date:2013-04-10T00:00:00
db:JVNDBid:JVNDB-2013-002404date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-168date:2013-04-19T00:00:00
db:NVDid:CVE-2013-0132date:2024-11-21T01:46:54.793

SOURCES RELEASE DATE

db:CERT/CCid:VU#310500date:2013-04-10T00:00:00
db:CNVDid:CNVD-2013-03025date:2013-04-15T00:00:00
db:BIDid:59020date:2013-04-10T00:00:00
db:JVNDBid:JVNDB-2013-002404date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-168date:2013-04-12T00:00:00
db:NVDid:CVE-2013-0132date:2013-04-18T18:55:01.583