Zero-day vulnerabilities discovered: 1
SQL injection
The vulnerability allows a remote attacker to execute arbitrary SQL commands in vulnerable application.
The vulnerability exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in the back-end database.
Successful exploitation may allow an attacker to gain unauthorized access to the vulnerable system.
Note: this vulnerability is being actively exploited.
The vulnerability may be tied to the DarkLeech attack campaign.
Software: Plesk
Links:
http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-windows-updates-release-notes.htm...
https://www.viestintavirasto.fi/kyberturvallisuus/haavoittuvuudet/2012/haavoittuvuus-2012-035.html
https://kb.plesk.com/en/113321
http://www.h-online.com/security/news/item/Bug-in-Plesk-administration-software-is-being-actively-ex...
http://cwcsstatus.co.uk/security-notifications/2012/11/07/plesk-sql-injection-vulnerability-part-4.h...
http://blogs.cisco.com/security/possible-exploit-vector-for-darkleech-compromises
http://www.darkreading.com/attacks-breaches/possible-exploit-avenue-discovered-for-darkleech-web-server-attacks/d/d-id/1139631?