• If you are still using CentOS 7.9, it's time to convert to Alma 8 with the free centos2alma tool by Plesk or Plesk Migrator. Please let us know your experiences or concerns in this thread:
    CentOS2Alma discussion
  • Inviting everyone to the UX test of a new security feature in the WP Toolkit
    For WordPress site owners, threats posed by hackers are ever-present. Because of this, we are developing a new security feature for the WP Toolkit. If the topic of WordPress website security is relevant to you, we would be grateful if you could share your experience and help us test the usability of this feature. We invite you to join us for a 1-hour online session via Google Meet. Select a convenient meeting time with our friendly UX staff here.

[PLESK 7.5 Reload] & [PLESK 7.6 for MS Windows] path passing and disclosure vulnerabi

lvalics

Silver Pleskian
Plesk Guru
/*--------------------------------------
[PLESK 7.5 Reload (and lower) & PLESK 7.6 for M$ Windows path passing and disclosure]
Discovered By: GuanYu
Email: [email protected]
Website: HVA (http://www.vnhacker.org)
--------------------------------------*/

-| Description: |-

PLESK is a powerful web control panel, site builder... You can see more about it at:

http://www.swsoft.com/en/products/plesk/switch/ .
So, i have found a security hole - path passing and disclosure - of this product (version

[PLESK 7.5 Reload] and [PLESK 7.6 for M$ Windows]) in the file : filemanager.php


-| What an attacker can do? |-

The attacker can take advantage of this hole to access the parent folder (which he havent

authorization).
Like this:

https://[stie]:8443/filemanager/filemanager.php?cmd=chdir&file=../

That URL will show him (attacker) the parent folder of his "web root" folder. Using more

"/../" characters, he'll go to up, up, and up folder so he can gain lot of important info.

-| How to fix it? |-

Upgrade to the PLESK 8.0 :D.

- End -

P/S: Sorry about my English, its to bad.
 
Back
Top