1. Please take a little time for this simple survey! Thank you for participating!
    Dismiss Notice
  2. Dear Pleskians, please read this carefully! New attachments and other rules Thank you!
    Dismiss Notice
  3. Dear Pleskians, I really hope that you will share your opinion in this Special topic for chatter about Plesk in the Clouds. Thank you!
    Dismiss Notice

[FIX] Remote vulnerability in Plesk on Linux

Discussion in 'Plesk 9.x for Linux Issues, Fixes, How-To' started by PMassi, Apr 2, 2012.

  1. PMassi

    PMassi Guest

    0
     
    Hi,
    applying this fix to Plesk 9.3 with Centos 5.8:
    http://kb.parallels.com/113313

    I have these problems:
    tar: This does not look like a tar archive
    tar: Skipping to next header
    tar: Archive contains obsolescent base-64 headers
    tar: Error exit delayed from previous errors

    --------------------------------------------------------------------

    Instead, downloading, extracting and uploading to the server this fix archive:
    http://kb.parallels.com/Attachments/18827/Attachments/plesk_remote_vulnerability_fix_deployer.tar.gz

    and running this command:
    /usr/local/psa/admin/bin/php plesk_remote_vulnerability_fix_deployer.php

    I have these errors:
    PHP Warning: Unexpected character in input: ' in plesk_remote_vulnerability_fix_deployer/plesk_remote_vulnerability_fix_deployer.php on line 57
    PHP Parse error: syntax error, unexpected T_DNUMBER in plesk_remote_vulnerability_fix_deployer.php on line 57

    I can't apply the fix to the problem.
    Please, is there someone that can help me?
    Thank you very much.
     
    Last edited by a moderator: Apr 2, 2012
  2. IgorG

    IgorG Forums Analyst Staff Member

    49
    24%
    Joined:
    Oct 27, 2009
    Messages:
    24,572
    Likes Received:
    1,243
    Location:
    Novosibirsk, Russia
    Sorry for mistake - there was double gzipped file in KB article. I have updated article with correct archive and you can try it now.
     
  3. PMassi

    PMassi Guest

    0
     
    Many thanks Igor, works perfectly.
     
Loading...