Bobcares

Plesk Vulnerabilities List: Safeguard Your Server

by | Jun 12, 2024

Let’s delve into a list of Plesk vulnerabilities and understand their implications. Our Plesk Support team is here to help you with your questions and concerns.

Plesk Vulnerabilities List: Safeguard Your Server

Plesk Vulnerabilities List: Safeguard Your ServerPlesk is a popular web hosting control panel. However, it has fallen victim to various security vulnerabilities over the years, affecting multiple versions of the software. These vulnerabilities can pose significant risks to server integrity and data security.

This is why we need to implement robust security measures and ensure consistent updates to avoid potential threats. Let’s look at some notable Plesk vulnerabilities and understand their implications.

Key Plesk Vulnerabilities

  • CVE-2023-4931

    An uncontrolled search path element vulnerability in Plesk Installer version 3.27.0.0 lets a local attacker to execute arbitrary code. This is done by injecting DLL files into the application’s folder.

    This leads to DLL hijacking in files like edputil.dll, samlib.dll, urlmon.dll, sspicli.dll, propsys.dll, and profapi.dll.

  • CVE-2023-43784

    Plesk Onyx 17.8.11 has fields related to an Amazon AWS Firehose component, specifically accessKeyId and secretAccessKey. The presence of these fields could be a potential vulnerability.

  • CVE-2023-24044

    A host header injection issue on the login page of Plesk Obsidian through version 18.0.49 lets attackers redirect users to malicious websites via a host request header.

  • CVE-2023-0829

    Furthermore, Versions of Plesk from 17.0 through 18.0.31 are vulnerable to cross-site scripting (XSS). This can be a problem if the administrator visits a specific page in Plesk related to the malicious subscription.

  • CVE-2022-45130

    Additionally, Plesk Obsidian is susceptible to a cross-site request forgery (CSRF) attack via the /api/v2/cli/commands REST API, which can change an admin password. This is specific to Plesk’s naming convention post-version 12.

  • CVE-2021-45008

    Plesk CMS version 18.0.37 has an insecure permissions vulnerability that allows privilege escalation from user to admin rights.

  • CVE-2021-45007

    Also, version 18.0.37 of Plesk also suffers from a CSRF vulnerability, enabling an attacker to insert data into the user and admin panels.

  • CVE-2020-11584

    Furthermore, a GET-based reflected XSS vulnerability in Plesk Onyx version 17.8.11 lets remote unauthenticated users inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

  • CVE-2020-11583

    Similarly, Plesk Obsidian version 18.0.17 has a GET-based reflected XSS vulnerability allowing remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter.

[Need assistance with a different issue? Our team is available 24/7.]

Conclusion

In brief, our Support Experts introduced us to the many Plesk vulnerabilities and their implications.

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Never again lose customers to poor
server speed! Let us help you.

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

PHPSESSID - Preserves user session state across page requests.

gdpr[consent_types] - Used to store user consents.

gdpr[allowed_cookies] - Used to store user allowed cookies.

PHPSESSID, gdpr[consent_types], gdpr[allowed_cookies]
PHPSESSID
WHMCSpKDlPzh2chML

Statistics

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

_ga - Preserves user session state across page requests.

_gat - Used by Google Analytics to throttle request rate

_gid - Registers a unique ID that is used to generate statistical data on how you use the website.

smartlookCookie - Used to collect user device and location information of the site visitors to improve the websites User Experience.

_ga, _gat, _gid
_ga, _gat, _gid
smartlookCookie
_clck, _clsk, CLID, ANONCHK, MR, MUID, SM

Marketing

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

IDE - Used by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user.

test_cookie - Used to check if the user's browser supports cookies.

1P_JAR - Google cookie. These cookies are used to collect website statistics and track conversion rates.

NID - Registers a unique ID that identifies a returning user's device. The ID is used for serving ads that are most relevant to the user.

DV - Google ad personalisation

_reb2bgeo - The visitor's geographical location

_reb2bloaded - Whether or not the script loaded for the visitor

_reb2bref - The referring URL for the visit

_reb2bsessionID - The visitor's RB2B session ID

_reb2buid - The visitor's RB2B user ID

IDE, test_cookie, 1P_JAR, NID, DV, NID
IDE, test_cookie
1P_JAR, NID, DV
NID
hblid
_reb2bgeo, _reb2bloaded, _reb2bref, _reb2bsessionID, _reb2buid

Security

These are essential site cookies, used by the google reCAPTCHA. These cookies use an unique identifier to verify if a visitor is human or a bot.

SID, APISID, HSID, NID, PREF
SID, APISID, HSID, NID, PREF