製品・ソフトウェアに関する情報
Parallels Plesk Panel の admin/plib/api-rpc/Agent.php における SQL インジェクションの脆弱性
Title Parallels Plesk Panel の admin/plib/api-rpc/Agent.php における SQL インジェクションの脆弱性
Summary

Parallels Plesk Panel の admin/plib/api-rpc/Agent.php には、SQL インジェクションの脆弱性が存在します。

Possible impacts 第三者により、任意の SQL コマンドを実行される可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date March 12, 2012, midnight
Registration Date March 14, 2012, 11:52 a.m.
Last Update March 14, 2012, 11:52 a.m.
CVSS2.0 : 危険
Score 7.5
Vector AV:N/AC:L/Au:N/C:P/I:P/A:P
Affected System
Parallels
Parallels Plesk Panel 10.0.1 MU#13 未満の 10.0.x
Parallels Plesk Panel 10.1.1 MU#22 未満の 10.1.x
Parallels Plesk Panel 10.2.0 MU#16 未満の 10.2.x
Parallels Plesk Panel 10.3.1 MU#5 未満の 10.3.x
Parallels Plesk Panel 7.x
Parallels Plesk Panel 8.6 MU#2 未満の 8.x
Parallels Plesk Panel 9.5 MU#11 未満の 9.x
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
No Changed Details Date of change
0 [2012年03月14日]
  掲載
Feb. 17, 2018, 10:37 a.m.

NVD Vulnerability Information
CVE-2012-1557
Summary

SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in March 2012.

Publication Date March 13, 2012, 4:55 a.m.
Registration Date Jan. 28, 2021, 2:55 p.m.
Last Update Nov. 21, 2024, 10:37 a.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:parallels:parallels_plesk_panel:8.2:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.0:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.6:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:7.6.1:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.1:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.4:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:8.3:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:7.0:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:a:parallels:parallels_plesk_panel:9.3:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:9.5.4:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:9.0:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:9.5:*:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:9.2:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#7:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#11:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#5:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#10:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#2:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#3:*:*:*:*:*:*
Configuration4 or higher or less more than less than
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#11:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#18:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#19:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#17:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#20:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#16:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#15:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#12:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#10:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#13:*:*:*:*:*:*
Configuration5 or higher or less more than less than
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#4:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#7:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#3:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#1:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#10:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#11:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#5:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#12:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#9:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#8:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#2:*:*:*:*:*:*
Configuration6 or higher or less more than less than
cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#2:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#4:*:*:*:*:*:*
cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#3:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List