SQL injection in Plesk - CVE-2012-1557
Published: January 11, 2017 / Updated: March 14, 2017
Plesk
Detailed vulnerability description
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in the back-end database.
Successful exploitation may allow an attacker to gain unauthorized access to the vulnerable system.
Note: this vulnerability is being actively exploited.