• Our team is looking to connect with folks who use email services provided by Plesk, or a premium service. If you'd like to be part of the discovery process and share your experiences, we invite you to complete this short screening survey. If your responses match the persona we are looking for, you'll receive a link to schedule a call at your convenience. We look forward to hearing from you!
  • We are looking for U.S.-based freelancer or agency working with SEO or WordPress for a quick 30-min interviews to gather feedback on XOVI, a successful German SEO tool we’re looking to launch in the U.S.
    If you qualify and participate, you’ll receive a $30 Amazon gift card as a thank-you. Please apply here. Thanks for helping shape a better SEO product for agencies!
  • The BIND DNS server has already been deprecated and removed from Plesk for Windows.
    If a Plesk for Windows server is still using BIND, the upgrade to Plesk Obsidian 18.0.70 will be unavailable until the administrator switches the DNS server to Microsoft DNS. We strongly recommend transitioning to Microsoft DNS within the next 6 weeks, before the Plesk 18.0.70 release.
  • The Horde component is removed from Plesk Installer. We recommend switching to another webmail software supported in Plesk.

Issue Multiple Vulnerabilities in PHP 5 thru 8.3.7 Could Allow for Remote Code Execution - PATCH NOW

J.Wick

Regular Pleskian
Server operating system version
Rocky Linux 8.10
Plesk version and microupdate number
Version 18.0.61 Update #5
This alert came out three days ago and there's no update for the following PHP vulnerability.

TLP:CLEAR
MS-ISAC CYBERSECURITY ADVISORY

MS-ISAC ADVISORY NUMBER:

2024-067

DATE(S) ISSUED:
06/07/2024

SUBJECT:
Multiple Vulnerabilities in PHP Could Allow for Remote Code Execution

OVERVIEW:
Multiple vulnerabilities have been discovered in PHP which could allow for remote code execution. PHP is a programming language originally designed for use in web-based applications with HTML content. Successful exploitation could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

THREAT INTELLIGENCE:
Open-source reports have stated that proof of concept exploits are available for CVE-2024-4577.

SYSTEMS AFFECTED:
  • PHP versions: 5 - 8.3.7

RISK:
Government:

  • Large and medium government entities: High
  • Small government entities: Medium

Businesses:
  • Large and medium business entities: High
  • Small business entities: Medium
Home users: Low

TECHNICAL SUMMARY:

Multiple vulnerabilities have been discovered in PHP which could allow for remote code execution. Details of the vulnerabilities are as follows:

Tactic: Execution (TA0041):

Technique: Command and Scripting Interpreter (T1059):

  • CVE-2024-1874: OS Command Injection
  • CVE-2024-2408: Observable discrepancy
  • CVE-2024-4577: OS Command Injection
  • CVE-2024-5458: Input validation error
 
Hello!

> This alert came out three days ago and there's no update for the following PHP vulnerability.
The updated versions of PHP are available since 10.06.2024. Please also note, that most critical vulnerability CVE-2024-4577 affects PHP-CGI + Apache on Windows, which is not supported even by Plesk for Windows.
 
Last edited:
This issue is Windows only but we had a few centos 7 plesk servers that we converted to Alma so thats good :) alot of news missed that its Windows only. but its good to get older php versions out :)
 
Back
Top