{"id":419,"date":"2013-04-15T05:33:11","date_gmt":"2013-04-15T05:33:11","guid":{"rendered":"https:\/\/cpanelplesk.com\/wp62\/?p=419"},"modified":"2016-06-10T04:14:55","modified_gmt":"2016-06-10T04:14:55","slug":"plesk-privilege-escalation-vulnerability","status":"publish","type":"post","link":"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/","title":{"rendered":"Plesk Privilege Escalation Vulnerability"},"content":{"rendered":"<p>Parallels have released a security update to address the\u00a0security\u00a0vulnerability (<a href=\"http:\/\/www.kb.cert.org\/vuls\/id\/310500\">details here<\/a>). An\u00a0authenticated\u00a0user in Plesk for linux is able to act as root and is able to run arbitrary codes. This may result in complete server\u00a0computerization.<\/p>\n<p>Last day Parallels issued a security advisory to address these vulnerabilities.<\/p>\n<p>These security updates will\u00a0automatically\u00a0visible in parallels Plesk panel, It takes only a few clicks to apply these. The\u00a0security\u00a0hot-fix\u00a0for Plesk 9.x is also\u00a0available\u00a0for download in Plesk knowledge base here.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Parallels have released a security update to address the\u00a0security\u00a0vulnerability (details here). An\u00a0authenticated\u00a0user in Plesk for linux is able to act as root and is able to run arbitrary codes. This may result in complete server\u00a0computerization. Last day Parallels issued a security advisory to address these vulnerabilities. These security updates will\u00a0automatically\u00a0visible in parallels Plesk panel, It [&#8230;]<\/p>\n<p><a class=\"understrap-read-more-link\" href=\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/\">Continue Reading&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-419","post","type-post","status-publish","format-standard","hentry","category-plesk"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Plesk Privilege Escalation Vulnerability - cPanel Plesk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Plesk Privilege Escalation Vulnerability - cPanel Plesk\" \/>\n<meta name=\"twitter:description\" content=\"Parallels have released a security update to address the\u00a0security\u00a0vulnerability (details here). An\u00a0authenticated\u00a0user in Plesk for linux is able to act as root and is able to run arbitrary codes. This may result in complete server\u00a0computerization. Last day Parallels issued a security advisory to address these vulnerabilities. These security updates will\u00a0automatically\u00a0visible in parallels Plesk panel, It [...]Continue Reading...\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Farooq Omer\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/\"},\"author\":{\"name\":\"Farooq Omer\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13\"},\"headline\":\"Plesk Privilege Escalation Vulnerability\",\"datePublished\":\"2013-04-15T05:33:11+00:00\",\"dateModified\":\"2016-06-10T04:14:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/\"},\"wordCount\":91,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13\"},\"articleSection\":[\"Plesk\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/\",\"url\":\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/\",\"name\":\"Plesk Privilege Escalation Vulnerability - cPanel Plesk\",\"isPartOf\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#website\"},\"datePublished\":\"2013-04-15T05:33:11+00:00\",\"dateModified\":\"2016-06-10T04:14:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cpanelplesk.com\/wp62\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Plesk Privilege Escalation Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#website\",\"url\":\"https:\/\/cpanelplesk.com\/wp62\/\",\"name\":\"cPanel Plesk\",\"description\":\"Blog on famous hosting control panels\",\"publisher\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cpanelplesk.com\/wp62\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13\",\"name\":\"Farooq Omer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/cpanelplesk.com\/wp62\/wp-content\/uploads\/2020\/11\/cpanelplesk.png\",\"contentUrl\":\"https:\/\/cpanelplesk.com\/wp62\/wp-content\/uploads\/2020\/11\/cpanelplesk.png\",\"width\":300,\"height\":44,\"caption\":\"Farooq Omer\"},\"logo\":{\"@id\":\"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/image\/\"},\"url\":\"https:\/\/cpanelplesk.com\/wp62\/author\/fokado\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Plesk Privilege Escalation Vulnerability - cPanel Plesk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/","twitter_card":"summary_large_image","twitter_title":"Plesk Privilege Escalation Vulnerability - cPanel Plesk","twitter_description":"Parallels have released a security update to address the\u00a0security\u00a0vulnerability (details here). An\u00a0authenticated\u00a0user in Plesk for linux is able to act as root and is able to run arbitrary codes. This may result in complete server\u00a0computerization. Last day Parallels issued a security advisory to address these vulnerabilities. These security updates will\u00a0automatically\u00a0visible in parallels Plesk panel, It [...]Continue Reading...","twitter_misc":{"Written by":"Farooq Omer"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/#article","isPartOf":{"@id":"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/"},"author":{"name":"Farooq Omer","@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13"},"headline":"Plesk Privilege Escalation Vulnerability","datePublished":"2013-04-15T05:33:11+00:00","dateModified":"2016-06-10T04:14:55+00:00","mainEntityOfPage":{"@id":"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/"},"wordCount":91,"commentCount":0,"publisher":{"@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13"},"articleSection":["Plesk"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/","url":"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/","name":"Plesk Privilege Escalation Vulnerability - cPanel Plesk","isPartOf":{"@id":"https:\/\/cpanelplesk.com\/wp62\/#website"},"datePublished":"2013-04-15T05:33:11+00:00","dateModified":"2016-06-10T04:14:55+00:00","breadcrumb":{"@id":"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cpanelplesk.com\/wp62\/plesk-privilege-escalation-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cpanelplesk.com\/wp62\/"},{"@type":"ListItem","position":2,"name":"Plesk Privilege Escalation Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/cpanelplesk.com\/wp62\/#website","url":"https:\/\/cpanelplesk.com\/wp62\/","name":"cPanel Plesk","description":"Blog on famous hosting control panels","publisher":{"@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cpanelplesk.com\/wp62\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/c78ae1cf9451a09592fb9697d69c0c13","name":"Farooq Omer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/image\/","url":"https:\/\/cpanelplesk.com\/wp62\/wp-content\/uploads\/2020\/11\/cpanelplesk.png","contentUrl":"https:\/\/cpanelplesk.com\/wp62\/wp-content\/uploads\/2020\/11\/cpanelplesk.png","width":300,"height":44,"caption":"Farooq Omer"},"logo":{"@id":"https:\/\/cpanelplesk.com\/wp62\/#\/schema\/person\/image\/"},"url":"https:\/\/cpanelplesk.com\/wp62\/author\/fokado\/"}]}},"_links":{"self":[{"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/posts\/419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/comments?post=419"}],"version-history":[{"count":0,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/posts\/419\/revisions"}],"wp:attachment":[{"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/media?parent=419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/categories?post=419"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cpanelplesk.com\/wp62\/wp-json\/wp\/v2\/tags?post=419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}