CVE-2012-1557

SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in March 2012.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:parallels:parallels_plesk_panel:7.0:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.0:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.1:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.2:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.3:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.4:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.6:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:parallels:parallels_plesk_panel:9.0:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:9.2:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:9.3:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:9.5:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:9.5.4:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#10:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#11:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#2:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#3:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#5:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#7:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#10:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#11:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#12:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#13:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#15:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#16:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#17:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#18:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#19:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#20:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#1:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#10:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#11:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#12:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#2:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#3:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#4:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#5:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#7:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#8:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#9:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#2:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#3:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#4:*:*:*:*:*:*

History

21 Nov 2024, 01:37

Type Values Removed Values Added
References () http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-linux-updates-release-notes.html#10216 - () http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-linux-updates-release-notes.html#10216 -
References () http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-windows-updates-release-notes.html#10216 - () http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-windows-updates-release-notes.html#10216 -
References () http://kb.parallels.com/en/113321 - Vendor Advisory () http://kb.parallels.com/en/113321 - Vendor Advisory
References () http://secunia.com/advisories/48262 - Vendor Advisory () http://secunia.com/advisories/48262 - Vendor Advisory
References () http://www.cert.fi/haavoittuvuudet/2012/haavoittuvuus-2012-035.html - () http://www.cert.fi/haavoittuvuudet/2012/haavoittuvuus-2012-035.html -
References () http://www.h-online.com/security/news/item/Bug-in-Plesk-administration-software-is-being-actively-exploited-1446587.html - () http://www.h-online.com/security/news/item/Bug-in-Plesk-administration-software-is-being-actively-exploited-1446587.html -
References () http://www.openwall.com/lists/oss-security/2012/03/08/3 - () http://www.openwall.com/lists/oss-security/2012/03/08/3 -
References () http://www.osvdb.org/79769 - () http://www.osvdb.org/79769 -
References () http://www.securityfocus.com/bid/52267 - () http://www.securityfocus.com/bid/52267 -
References () http://www.securitytracker.com/id?1026760 - () http://www.securitytracker.com/id?1026760 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/73628 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/73628 -

Information

Published : 2012-03-12 19:55

Updated : 2024-11-21 01:37


NVD link : CVE-2012-1557

Mitre link : CVE-2012-1557

CVE.ORG link : CVE-2012-1557


JSON object : View

Products Affected

parallels

  • parallels_plesk_panel
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')