| Summary | SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in March 2012. |
|---|---|
| Publication Date | March 13, 2012, 4:55 a.m. |
| Registration Date | Jan. 28, 2021, 2:55 p.m. |
| Last Update | Nov. 21, 2024, 10:37 a.m. |
| CVSS2.0 : HIGH | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | いいえ |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:parallels:parallels_plesk_panel:8.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:8.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:8.6:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:7.6.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:8.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:8.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:8.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:7.0:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:a:parallels:parallels_plesk_panel:9.3:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:9.5.4:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:9.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:9.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:9.2:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#7:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#11:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#5:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#10:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#2:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#3:*:*:*:*:*:* | |||||
| Configuration4 | or higher | or less | more than | less than | |
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#11:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#18:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#19:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#17:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#20:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#16:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#15:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#12:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#10:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#13:*:*:*:*:*:* | |||||
| Configuration5 | or higher | or less | more than | less than | |
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#4:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#7:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#3:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#1:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#10:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#11:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#5:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#12:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#9:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#8:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#2:*:*:*:*:*:* | |||||
| Configuration6 | or higher | or less | more than | less than | |
| cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#2:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#4:*:*:*:*:*:* | |||||
| cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#3:*:*:*:*:*:* | |||||
| Title | Parallels Plesk Panel の admin/plib/api-rpc/Agent.php における SQL インジェクションの脆弱性 |
|---|---|
| Summary | Parallels Plesk Panel の admin/plib/api-rpc/Agent.php には、SQL インジェクションの脆弱性が存在します。 |
| Possible impacts | 第三者により、任意の SQL コマンドを実行される可能性があります。 |
| Solution | ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date | March 12, 2012, midnight |
| Registration Date | March 14, 2012, 11:52 a.m. |
| Last Update | March 14, 2012, 11:52 a.m. |
| Parallels |
| Parallels Plesk Panel 10.0.1 MU#13 未満の 10.0.x |
| Parallels Plesk Panel 10.1.1 MU#22 未満の 10.1.x |
| Parallels Plesk Panel 10.2.0 MU#16 未満の 10.2.x |
| Parallels Plesk Panel 10.3.1 MU#5 未満の 10.3.x |
| Parallels Plesk Panel 7.x |
| Parallels Plesk Panel 8.6 MU#2 未満の 8.x |
| Parallels Plesk Panel 9.5 MU#11 未満の 9.x |
| No | Changed Details | Date of change |
|---|---|---|
| 0 | [2012年03月14日] 掲載 |
Feb. 17, 2018, 10:37 a.m. |