• Inviting everyone who uses WordPress management tools in Plesk
    The Plesk team is conducting a 60-minute research session that includes an interview and a moderated usability test.
    To participate, please use this link .
    Your experience will help shape product decisions and ensure the tools better support real-world use cases.

Fix for mod_fcgid exploit?

horst rupp

Basic Pleskian
Hello,

will there be a fix for the mod_fcgid vulnerability/exploit for plesk 9.5 or a workaround? I have psa-mod_fcgid-1.10-3.rpm installed and the vuln is present there. If I set a domains php to fastcgi and open this php-script it crashes apache with segfault:

<?php
error_log(str_repeat("x", 20000));
?>

... as described here: http://blog.tigertech.net/posts/cve-2013-4365/

There's already an exploit available online (http://www.1337day.com/exploit/description/21471 but I can't check it out, because they only sell it but should be somewhere for free soon).

Anyway the sourcecode of psa-mod_fcgid-1.10-3.rpm should be somewhere published by parallels but didn't find it anywhere?


regards
ho
 
You can also get the srpm from the same place if you browse up a few directories. I've been using either the ART version or the cloud linux version for years now with out issue.
 
You can also get the srpm from the same place if you browse up a few directories. I've been using either the ART version or the cloud linux version for years now with out issue.

but where do I find the source of the parallels version to compare it to?
 
Back
Top