iTnews

Plesk exploit gives Apache privilege escalation edge

By Danielle Walker on Jun 11, 2013 8:30AM
Plesk exploit gives Apache privilege escalation edge

Kingcope dropped exploit code.

A hacker has disclosed exploit for a code-execution flaw impacting older versions of popular server administrator software used to create websites, email and other accounts.

The exploit code for Parallels Plesk Panel software was posted last week on seclists.org by an individual known as Kingcope.

The exploit must be used in tandem with Apache Web server software, and can ultimately allow an attacker to inject malicious PHP code, programming language used to create dynamic web pages.

A saboteur would have the ability to execute arbitrary commands by escalating user privileges in the Apache server.

To carry out the feat, an attacker would have to run Plesk in CGI mode in PHP.

Kingcope said the vulnerability (CVE-2012-1823) can be exploited in Plesk 9.5.4 and earlier versions of the control panel, but Parallels, the Seattle-based maker of the software, has stated otherwise.

Parallels shared hosting vice president Craig Bartholomew told SC version 9.5.4 of the software was not vulnerable due to a CGI wrapper implemented in the software.

Instead, the flaw impacts Plesk versions 9.3, 9.2 and 9.0.

The most recent Plesk releases are versions 10 and 11. 

Cisco Systems researcher Craig Williams said even though the vulnerability affects older versions of Plesk Panel (running on Linux and FreeBSD operating systems), the impact of the exploit could prove serious given how outdated the software is.

This article originally appeared at scmagazineus.com

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © SC Magazine, US edition
Tags:
apache cisco exploits plesk security vulnerabilities

Partner Content

MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
Partner Content MSI shows first laptops with Wi-Fi 6E, Nvidia RTX 30 graphics
MSI launches innovative new laptops
Partner Content MSI launches innovative new laptops
Improving returns from SD-WAN spending
Sponsored Content Improving returns from SD-WAN spending
NCS expands into Australia in partnership with Optus Enterprise
Sponsored Content NCS expands into Australia in partnership with Optus Enterprise

Sponsored Whitepapers

The risky business of open source
The risky business of open source
Mitigating open source risk in your organisation
Mitigating open source risk in your organisation
How to choose a WAF that's right for you
How to choose a WAF that's right for you
The global telco 5G cloud gaming opportunity
The global telco 5G cloud gaming opportunity
Building a ransomware remediation backup strategy
Building a ransomware remediation backup strategy

Events

  • On-Demand Webinar: How Poly and Microsoft are Embracing Future Work Environments
By Danielle Walker
Jun 11 2013
8:30AM
0 Comments

Related Articles

  • Cisco servers compromised using SaltStack flaws
  • Microsoft, Amazon, Cisco, Salesforce alarmed at security incident response takeover by govt
  • Ex-Cisco engineer deleted 456 VMs for WebEx Teams after exit
  • University of Queensland rolls out MFA to staff and research students
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Update Chrome or risk remote takeover, US govt warns

Update Chrome or risk remote takeover, US govt warns

Telstra pilots its first neurodiversity recruitment program

Telstra pilots its first neurodiversity recruitment program

Google unravels state-of-art Android and Windows exploit chains

Google unravels state-of-art Android and Windows exploit chains

Accellion hack behind Reserve Bank of NZ data breach

Accellion hack behind Reserve Bank of NZ data breach

You must be a registered member of iTnews to post a comment.
Log In | Register
All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of nextmedia's Privacy Policy and Terms & Conditions.