Vulnerability Details : CVE-2012-1557
SQL injection vulnerability in admin/plib/api-rpc/Agent.php in Parallels Plesk Panel 7.x and 8.x before 8.6 MU#2, 9.x before 9.5 MU#11, 10.0.x before MU#13, 10.1.x before MU#22, 10.2.x before MU#16, and 10.3.x before MU#5 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, as exploited in the wild in March 2012.
Vulnerability category: Sql Injection
Exploit prediction scoring system (EPSS) score for CVE-2012-1557
Probability of exploitation activity in the next 30 days: 0.43%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 71 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2012-1557
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2012-1557
-
The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-1557
-
http://kb.parallels.com/en/113321
KB ParallelsVendor Advisory
-
http://www.cert.fi/haavoittuvuudet/2012/haavoittuvuus-2012-035.html
Etusivu | Kyberturvallisuuskeskus
-
http://www.securitytracker.com/id?1026760
Parallels Plesk Unspecified Flaw Lets Remote Users Access and Modify the System - SecurityTracker
-
http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-linux-updates-release-notes.html#10216
-
http://download1.parallels.com/Plesk/PP10/parallels-plesk-panel-10-windows-updates-release-notes.html#10216
Release Notes for Updates Issued for Parallels Plesk Panel 10.x for Windows Systems
-
http://www.openwall.com/lists/oss-security/2012/03/08/3
oss-security - CVE-request: Parallels Plesk Panel admin/plib/api-rpc/Agent.php Unspecified SQL Injection
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/73628
Parallels Plesk Panel unspecified unauthorized access CVE-2012-1557 Vulnerability Report
-
http://www.securityfocus.com/bid/52267
Parallels Plesk Panel Unspecified Remote Security Vulnerability
-
http://www.h-online.com/security/news/item/Bug-in-Plesk-administration-software-is-being-actively-exploited-1446587.html
Bug in Plesk administration software is being actively exploited - The H Security: News and Features
Products affected by CVE-2012-1557
- cpe:2.3:a:parallels:parallels_plesk_panel:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:8.6:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:7.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:8.3:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:8.4:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:8.2:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:9.2:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:9.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:9.3:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:9.5:*:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#10:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#7:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#5:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#3:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#2:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.0.1:mu_\#11:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#18:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#17:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#16:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#15:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#20:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#19:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#11:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#10:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#13:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.1.1:mu_\#12:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#12:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#4:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#3:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#11:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#10:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#2:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#1:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#7:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#5:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#9:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.2.0:mu_\#8:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#2:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#4:*:*:*:*:*:*
- cpe:2.3:a:parallels:parallels_plesk_panel:10.3.1:mu_\#3:*:*:*:*:*:*