SQL injection in Parallels Plesk Panel

Published: 2012-02-15 | Updated: 2017-03-14
Severity High
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2012-1557
CWE ID CWE-89
Exploitation vector Network
Public exploit This vulnerability is being exploited in the wild.
Vulnerable software Plesk Subscribe
Vendor Parallels

Security Advisory

This security advisory describes one high risk vulnerability.

1) SQL injection

Severity: High

CVSSv3: 9.1 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C] [PCI]

CVE-ID: CVE-2012-1557

CWE-ID: CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Description

The vulnerability allows a remote attacker to execute arbitrary SQL commands in vulnerable application.

The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in the back-end database.

Successful exploitation may allow an attacker to gain unauthorized access to the vulnerable system.

Note: this vulnerability is being actively exploited.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Plesk: 7.0, 7.6.1, 8.0, 8.1, 8.2, 8.3, 8.4, 8.6.0, 9.0, 9.2, 9.3, 9.5, 9.5.4, 10.0.1, 10.1.1, 10.2.0, 10.3.1

CPE External links

https://support.plesk.com/hc/en-us/articles/213914045

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, a fully functional exploit for this vulnerability is available.



ImmuniWeb® AI Platform for Application Security Testing