SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Plesk Vendors:   Parallels
Parallels Plesk Panel Scripts Let Remote Authenticated Users Execute Arbitrary Code with Root Privileges
SecurityTracker Alert ID:  1028427
SecurityTracker URL:  http://securitytracker.com/id/1028427
CVE Reference:   CVE-2013-0132, CVE-2013-0133   (Links to External Site)
Date:  Apr 15 2013
Impact:   Execution of arbitrary code via network, Root access via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 9.5, 10.x, 11.x
Description:   Two vulnerabilities were reported in Parallels Plesk Panel. A remote authenticated user can execute arbitrary code on the target system.

A remote authenticated user can invoke 'cgi-wrapper' via '/usr/sbin/suexec' to execute arbitrary PHP with root privileges [CVE-2013-0132].

A remote authenticated 'psaadm' user can supply a specially crafted PATH environment variable and invoke '/usr/local/psa/admin/sbin/wrapper' to execute certain administrative scripts with root privileges [CVE-2013-0133].

Ronald Volgers of Pine Digital Security reported these vulnerabilities.

Impact:   A remote authenticated user can execute arbitrary code on the target system with root privileges.
Solution:   The vendor has issued the following fixes:

9.5.4: MU#28
10.0.1: MU#18
10.1.1: MU#24
10.2.0: MU#19
10.3.1: MU#20
10.4.4: MU#49
11: MU#46

The vendor's advisory is available at:

http://kb.parallels.com/en/115942

Vendor URL:  kb.parallels.com/en/115942 (Links to External Site)
Cause:   Access control error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC