First published: Mon Mar 12 2012(Updated: )
SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in March 2012.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plesk | =7.0 | |
Plesk | =7.6.1 | |
Plesk | =8.0 | |
Plesk | =8.1 | |
Plesk | =8.2 | |
Plesk | =8.3 | |
Plesk | =8.4 | |
Plesk | =8.6 | |
Plesk | =9.0 | |
Plesk | =9.2 | |
Plesk | =9.3 | |
Plesk | =9.5 | |
Plesk | =9.5.4 | |
Plesk | =10.0.1-mu_\#10 | |
Plesk | =10.0.1-mu_\#11 | |
Plesk | =10.0.1-mu_\#2 | |
Plesk | =10.0.1-mu_\#3 | |
Plesk | =10.0.1-mu_\#5 | |
Plesk | =10.0.1-mu_\#7 | |
Plesk | =10.1.1-mu_\#10 | |
Plesk | =10.1.1-mu_\#11 | |
Plesk | =10.1.1-mu_\#12 | |
Plesk | =10.1.1-mu_\#13 | |
Plesk | =10.1.1-mu_\#15 | |
Plesk | =10.1.1-mu_\#16 | |
Plesk | =10.1.1-mu_\#17 | |
Plesk | =10.1.1-mu_\#18 | |
Plesk | =10.1.1-mu_\#19 | |
Plesk | =10.1.1-mu_\#20 | |
Plesk | =10.2.0-mu_\#1 | |
Plesk | =10.2.0-mu_\#10 | |
Plesk | =10.2.0-mu_\#11 | |
Plesk | =10.2.0-mu_\#12 | |
Plesk | =10.2.0-mu_\#2 | |
Plesk | =10.2.0-mu_\#3 | |
Plesk | =10.2.0-mu_\#4 | |
Plesk | =10.2.0-mu_\#5 | |
Plesk | =10.2.0-mu_\#7 | |
Plesk | =10.2.0-mu_\#8 | |
Plesk | =10.2.0-mu_\#9 | |
Plesk | =10.3.1-mu_\#2 | |
Plesk | =10.3.1-mu_\#3 | |
Plesk | =10.3.1-mu_\#4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-1557 has a CVSS score indicating it is a critical severity vulnerability.
To fix CVE-2012-1557, update Parallels Plesk Panel to version 8.6 MU#2 or later, or to the appropriate version in the 9.x or 10.x series.
CVE-2012-1557 affects Parallels Plesk Panel versions 7.x through 10.3.x prior to their respective updates.
Yes, CVE-2012-1557 allows remote attackers to execute arbitrary SQL commands, potentially compromising the database.
Although no specific exploit is widely published, the nature of CVE-2012-1557 indicates that it can be exploited through SQL injection techniques.