CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
AI Score
Confidence
Low
EPSS
Percentile
74.4%
SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in March 2012.
Vendor | Product | Version | CPE |
---|---|---|---|
parallels | parallels_plesk_panel | 7.0 | cpe:2.3:a:parallels:parallels_plesk_panel:7.0:*:*:*:*:*:*:* |
parallels | parallels_plesk_panel | 7.6.1 | cpe:2.3:a:parallels:parallels_plesk_panel:7.6.1:*:*:*:*:*:*:* |
parallels | parallels_plesk_panel | 8.0 | cpe:2.3:a:parallels:parallels_plesk_panel:8.0:*:*:*:*:*:*:* |
parallels | parallels_plesk_panel | 8.1 | cpe:2.3:a:parallels:parallels_plesk_panel:8.1:*:*:*:*:*:*:* |
parallels | parallels_plesk_panel | 8.2 | cpe:2.3:a:parallels:parallels_plesk_panel:8.2:*:*:*:*:*:*:* |
parallels | parallels_plesk_panel | 8.3 | cpe:2.3:a:parallels:parallels_plesk_panel:8.3:*:*:*:*:*:*:* |
parallels | parallels_plesk_panel | 8.4 | cpe:2.3:a:parallels:parallels_plesk_panel:8.4:*:*:*:*:*:*:* |
parallels | parallels_plesk_panel | 8.6 | cpe:2.3:a:parallels:parallels_plesk_panel:8.6:*:*:*:*:*:*:* |
parallels | parallels_plesk_panel | 9.0 | cpe:2.3:a:parallels:parallels_plesk_panel:9.0:*:*:*:*:*:*:* |
parallels | parallels_plesk_panel | 9.2 | cpe:2.3:a:parallels:parallels_plesk_panel:9.2:*:*:*:*:*:*:* |
download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-linux-updates-release-notes.html#10216
download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-windows-updates-release-notes.html#10216
kb.parallels.com/en/113321
secunia.com/advisories/48262
www.cert.fi/haavoittuvuudet/2012/haavoittuvuus-2012-035.html
www.h-online.com/security/news/item/Bug-in-Plesk-administration-software-is-being-actively-exploited-1446587.html
www.openwall.com/lists/oss-security/2012/03/08/3
www.osvdb.org/79769
www.securityfocus.com/bid/52267
www.securitytracker.com/id?1026760
exchange.xforce.ibmcloud.com/vulnerabilities/73628