- Server operating system version
- CentOS 7.9
- Plesk version and microupdate number
- Obsidian 18.0.43
This morning we've seen three cases in different machines and customer subscriptions where a script running in a customer website has uploaded an executable to /var/tmp and then created a cron job in Plesk to execute the file (as exec, shell_exec, system etc. commands in PHP are disabled here). The purpose of the execution was to run a stand-alone sendmail instance. Not only the PHP execution commands are blocked, but the customers are chrooted, too.
How is this possible and how can we prevent scripts from creating crontab jobs in Plesk?
How is this possible and how can we prevent scripts from creating crontab jobs in Plesk?