Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2014.0081 A vulnerability has been identified in Parallels Plesk Panel versions prior to 10.4.4 MU#58 and 11.0.9 MU#62 22 July 2014 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Parallels Plesk Panel Operating System: Windows Linux variants Impact/Access: Cross-site Scripting -- Remote with User Interaction Access Confidential Data -- Remote/Unauthenticated Resolution: Patch/Upgrade Member content until: Thursday, August 21 2014 OVERVIEW A vulnerability has been identified in Parallels Plesk Panel versions prior to 10.4.4 MU#58 and 11.0.9 MU#62. [1] IMPACT The vendor has provided the following information concerning the vulnerability: "Medium severity XML External Entity (XXE) issue affects PP versions 10.4.x and 11.0.x both Linux and Windows with installed Single Sign-On (SSO) service. May be unexploitable depending on installed libxml2 version. Impact is limited because SSO works under own unprivileged user sso, it means only files available for this user could be read. Minor severity Cross-Site Scripting (XSS) issue affects PP versions 10.4.x and 11.0.x both Linux and Windows with installed Single Sign-On (SSO) service." [1] MITIGATION Users should update to the latest MU# of their version of Plesk Panel. [1] REFERENCES [1] Plesk 10 & 11 SSO XXE/XSS http://kb.parallels.com/en/122245 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBU82xVBLndAQH1ShLAQItvxAAqhOAn4zZLFfkv3G3BlPbAPf1PtEMIXsI Uj2AVfIIAVxzCXfYp8e+xV/J6Oy2bu/t5032WImweShjMrHkAgAlfX2PmrttwUQN ag5SJpfEkBI3gEt/ilQggaopEIutWMp7qNWqXuzfbYXzU7KmMB48kCUHE6fwivbU iukmO4ZTCrcJJFiXhKd85ptL1MjPGLPepKxiDpXm5gB/Z/de2ZMhPH+B6UjT0XNo ejMp4IFh66kVWtZ9nwiCSAsvFG0Y2BXBwFbZ/OVQRo2vQbxUUdcItUTYiwEYgBQo +6YsjmE7EjLk5r1w7yclwfl1UezeYMz+IyKhnqzP14P1qjZnB7slsGLxjVIIVd5G 1f/pBRjh/eGwO9cqqBTzRkJ2xLcNfMI1Vs5kye15JLXAhsMVFuJL//H/i42KQZaL Yw4xuXMUASiWE5SmaOFpOtBjPmc2MuQEyOfxM5MgPK6i3m9r0pOr7EEEst3ziVpn iKmM9KAsrh3nHcH6c1roHkuULr97bAK4adY25dmaqGgrGODSRJ1UBIO2sSKNM+V6 pr0VaJ2zLoPM/bsooETPZRWVonahC2li4sR1G2aRuuewSB8+KlJ1BSq+4ppQYzKU KzBNAPMfPsNMVPl1yKt9mImuH+SfstLfN9m6DDjuHjLnWQvVHqpuPbnOubuNz7DA 2alKy+ZKg2U= =pLjD -----END PGP SIGNATURE-----