• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Horde vulnerability need a fix please parallels

105547111

Silver Pleskian
http://www.securityfocus.com/bid/28898

Horde Webmail is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials.

I hope we see a hotfix for this soon, as a security bug is very important.
 
More information on this, the condition effects only Horde-Kronolith. Kronolith 2.1.8 resolves the issue.

As a short term workaround you can remove the package with:
rpm -e psa-kronolith

ASL users are unaffected by this vulnerability.
 
http://www.securityfocus.com/bid/28898

Horde Webmail is prone to a cross-site scripting vulnerability because the application fails to properly sanitize user-supplied input. Attacker-supplied HTML and script code would execute in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials.

I hope we see a hotfix for this soon, as a security bug is very important.

Hello 105547111,

Thank you for the report. It will be fixed as soon as possible.
 
ASL users are unaffected by this vulnerability.
But ASL is detecting this too, how is ASL protecting us from this vulnerability? Will Horde-Kronolith. Kronolith 2.1.8 be in your ART repo soon?
 
Since horde and mod_security are running through the same instance of apache, the virtual patches used in mod_sec are compensating for the vulnerability in kronolith. We're reporting it, because we are required to as an auditor. Even though there is a compensating security control around it. Eventually we'll get the logic into ASL to make map compensating controls to specific vulnerabilities

I hadn't planned on doing a kronolith update until you just mentioned it now. It might not be a lot of work, I'll have to look into it
 
I hope it gets fixed soon as a known security issue should take preference even over a bug fix as its a known exploit
 
I have released psa-kronolith version 2.1.8 in the [atomic] archive. This resolves the security vulnerability reported in http://www.securityfocus.com/bid/28898

This update is available for CentOS 3/4/5, Fedora 4/5/6/7/8/9 and RHEL 3/4/5. In order to add the update perform the following:

Step 1) Add the atomic yum repository
wget -q -O - http://www.atomicorp.com/installers/atomic |sh

Step 2) Update psa-kronolith
yum update psa-kronolith

Thanks very much to PixyPumpkin for the motivation on this update.
 
It will be fixed as soon as possible.

Hello sergius,

Could you tell me please, why parrallels is slower than atomicturtle :)

This is a security issue.. And it is becouse of parallels choices.. And also it must be fixed immediately not "as soon as possible"..

We forget about new pretty features. We only want a stable control panel from parallels for our customers. And these customers are ours. Not parallels's! We sell them hosting plans, not VPS packages nor control panel software.. When will parrallels stop spamming to our customers? When will parallels publish a stable version? When will parallels start to fix bugs immediatelly?
 
I have released psa-kronolith version 2.1.8 in the [atomic] archive. This resolves the security vulnerability reported in http://www.securityfocus.com/bid/28898

This update is available for CentOS 3/4/5, Fedora 4/5/6/7/8/9 and RHEL 3/4/5. In order to add the update perform the following:

Step 1) Add the atomic yum repository
wget -q -O - http://www.atomicorp.com/installers/atomic |sh

Step 2) Update psa-kronolith
yum update psa-kronolith

Thanks very much to PixyPumpkin for the motivation on this update.


I use PSA 8.3, should i upgrade psa-kronolith? It is shown to be updated, but in my componenty in the CP psa-kronolith is not shown!?
 
Thanks very much to PixyPumpkin for the motivation on this update.
My pleasure, thank you for the quick response and for making the update :)
 
Yes the psa-kronolith update will work on PSA 8.3 as well. Horde on 8.3 also suffers from these additional security vulnerabilities:

Horde Turba Vulnerability CVE-2008-0807
Horde Vulnerability SA28382
Horde Turba Vulnerability SA28382
Horde Mnemo Vulnerability SA28382
Horde Kronolith Vulnerability SA28382
Horde Vulnerability CVE-2007-6018
Horde Vulnerability CVE-2008-1284

All of these are corrected by the versions of these packages included in 8.4. So you should be able to use the newer horde packages from 8.4 on 8.3.
 
Gentlemen,

The issue is fixed and will be delivered w/ Plesk 8.4.1 which is expected in the end of June.
 
10 Days over and nothing happen :( Maybe it come some fixes this may or not?

Gentlemen,

The issue is fixed and will be delivered w/ Plesk 8.4.1 which is expected in the end of June.

I really find it amazing and quite perplexing what takes Parallels so long to push out even the most critical security updates. cPanel pushes out updated in hours when it's necessary.
 
Back
Top