{"id":7752,"date":"2013-06-07T21:29:25","date_gmt":"2013-06-07T21:29:25","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=c14ad14cdd6c41e79b6a881b7c240508"},"modified":"2013-06-07T21:29:25","modified_gmt":"2013-06-07T21:29:25","slug":"variation-of-previously-reported-vulnerability-in-older-versions-of-parallels-plesk-panel","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/variation-of-previously-reported-vulnerability-in-older-versions-of-parallels-plesk-panel\/","title":{"rendered":"Variation of previously reported vulnerability in older versions of Parallels Plesk Panel"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"color: black;\">A variation is being reported of a previously-reported zero-day vulnerability in older versions of Parallels Plesk Panel. Since the original vulnerability was first reported, the majority of Parallels Plesk Panel customers took the necessary steps to upgrade to a non-vulnerable version of the product. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: black;\">Today only 4% of servers running Parallels Plesk Panel are potentially impacted. This means 96% of Parallels Plesk Panel servers have been updated to a non-vulnerable version of Parallels Plesk Panel. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: black;\">If you are still running Parallels Plesk Panel 9.0 to 9.2, please take the action to upgrade today. There are multiple version options to upgrade to in order to help you secure and protect your customers. <\/span><\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\"><span style=\"color: black;\">How to upgrade<\/span><\/span><\/strong><\/p>\n<ul>\n<\/ul>\n<p style=\"padding-left: 30px;\">+ The best version to upgrade to is Parallels Plesk Panel 11.0. It has been available for over a year and is the version with the highest deployment rate, lowest support cost, best performance and, of course, highest security.<\/p>\n<ul style=\"padding-left: 30px;\">\n<\/ul>\n<p style=\"padding-left: 30px;\">+ On June 13, 2013, Parallels will launch Parallels Plesk Panel 11.5. This <a href=\"http:\/\/blogs.parallels.com\/serviceprovider\/2013\/4\/18\/professionals-choice-is-the-focus-of-parallels-plesk-panel-1.html\">new version<\/a> will come with additional usability, performance and security benefits.<\/p>\n<ul style=\"padding-left: 30px;\">\n<\/ul>\n<p style=\"padding-left: 30px;\">+ If you cannot upgrade to the latest version, you can update now to Parallels Plesk Panel 9.5.4. This is a direct upgrade through the AutoInstaller. On June 13 you can then upgrade to version 11.5.<\/p>\n<ul>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>If you are unable to upgrade at this time, you can apply a script to automatically update your Parallels Plesk Panel for Linux 9.0-9.2.3 server.&nbsp; You can download that script (wrapper.zip) from the &#8220;Attachments&#8221; section of <a href=\"http:\/\/kb.parallels.com\/116241\">http:\/\/kb.parallels.com\/116241<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong><span style=\"text-decoration: underline;\"><span style=\"color: black;\">Details about the vulnerability<\/span><\/span><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: black;\">This vulnerability is not new.&nbsp; It is a variation of the long-known CVE-2012-1823 vulnerability related to the CGI mode of PHP&nbsp;in selected older and end-of-life versions of Parallels Plesk Panel. The exploit for this vulnerability uses a combination of two issues:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<\/ul>\n<p style=\"padding-left: 30px;\"><span style=\"color: black;\">+ PHP vulnerability CVE-2012-1823 related to CGI mode used in older versions of Parallels Plesk Panel (<\/span><a href=\"http:\/\/echo4.bluehornet.com\/ct\/21303509:23042718500:m:1:2146898213:EF84F9D91A69348CAE361924BC35ADC0:r\">http:\/\/kb.parallels.com\/en\/113818<\/a><span style=\"color: black;\">)<\/span><\/p>\n<ul style=\"padding-left: 30px;\">\n<\/ul>\n<p style=\"padding-left: 30px;\"><span style=\"color: black;\">+ Parallels Plesk Panel phppath script alias usage in Parallels Plesk Panel versions 9.0-9.2<\/span><\/p>\n<ul>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"color: black;\">All currently supported versions of Parallels Plesk Panel 9.5.4, 10.x and 11.x, as well as Parallels Plesk Automation, are NOT vulnerable. Also, Parallels Plesk Panel 8.x (now end-of-life) is NOT vulnerable.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: black;\">There also are some additional resources to insure that your Parallels Plesk Panel installation is secure, and malware, if present, is removed:<\/span><\/p>\n<p style=\"padding-left: 30px;\">&nbsp;<\/p>\n<ul style=\"padding-left: 30px;\">\n<\/ul>\n<p style=\"padding-left: 30px;\">+ Parallels has created a comprehensive page on securing Parallels Plesk Panel at <a href=\"http:\/\/kb.parallels.com\/en\/114396\"><span style=\"color: windowtext;\">http:\/\/kb.parallels.com\/en\/114396<\/span><\/a><\/p>\n<ul style=\"padding-left: 30px;\">\n<\/ul>\n<ul style=\"padding-left: 30px;\">\n<\/ul>\n<p style=\"padding-left: 30px;\">+ Parallels has created a malware removal tool at <a href=\"http:\/\/kb.parallels.com\/en\/115025\"><span style=\"color: windowtext;\">http:\/\/kb.parallels.com\/en\/115025<\/span><\/a><\/p>\n<ul>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"color: black;\">To stay on top of Parallels security communications please subscribe to our support e-mails by clicking <\/span><a href=\"http:\/\/kb.parallels.com.\/subscriptions\" ><span style=\"color: #3366ff;\">here<\/span><\/a><span style=\"color: black;\">, subscribe to our RSS feed <\/span><a href=\"http:\/\/kb.parallels.com.\/rss\/index.html\" ><span style=\"color: #3366ff;\">here<\/span><\/a><span style=\"color: black;\"> and add our Knowledge Base browser plug-in <\/span><a href=\"http:\/\/kb.parallels.com\/\"><span style=\"color: #3366ff;\">here<\/span><\/a><span style=\"color: #3366ff;\">.&nbsp;<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"color: black;\"><a href=\"mailto:adambo@parallels.com\">Adam Bogobowicz<\/a>, Sr. Director of Product Marketing <\/span><\/p>\n<p><span style=\"color: black;\"><br \/><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;<br \/>\nA variation is being reported of a previously-reported zero-day vulnerability in older versions of Parallels Plesk Panel. Since the original vulnerability was first reported, the majority of Parallels Plesk Panel customers took the necessary ste&#8230;<\/p>\n","protected":false},"author":43,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[95,1552,1643,1570,1644],"tags":[],"class_list":["post-7752","post","type-post","status-publish","format-standard","hentry","category-control-panels","category-parallels-plesk-panel","category-php-vulnerability","category-security-updates","category-tips-tricks"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/7752","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=7752"}],"version-history":[{"count":0,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/7752\/revisions"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=7752"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=7752"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=7752"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}