Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Botnet Exploits Yet-to-be Patched Plesk Flaw

According to security researchers, one new botnet is capitalizing on certain security flaw affecting Plesk, the regulatory software for hosting, prompting experts to increasingly suggest users for downloading the product's latest version, published threatpost.com dated June 10, 2013.

 

Kingcope, name of a hacker, during the past-week, posted an alert about the instruction insertion flaw of Plesk along with an attack code onto Full Disclosure. The security researchers stated that a maximum of 40 infections every 60 minutes were observed, while a few Apache server settings were as well vulnerable.

 

The widely-used Plesk reportedly, helps in regulating website configurations that could relate with an unlimited number of URLs. The maker of 'Plesk,' Parallels an organization based in Seattle primarily trades software aimed at benefiting web-hosts while also sells virtualization applications.

 

The flaw in discussion, facilitates execution of remote code impacting software namely PGP-CGI. An advisory from Parallels indicated that the vulnerability impacts 9.2 and 9.0 versions of Plesk Panel running on UNIX/Linux. But subsequent versions aren't susceptible; therefore consumers should adapt to any of those.

 

Moreover according to Trend Micro, the flaw can be exploited without difficulty using the exploit present as also if the exploitation is effective then affected end-users can loose full control of their systems by leaking their web-service rights.

 

Additionally the security company stated that there was never a 100% case of regular server updates by users. This got emphasized recently via the Ruby-on-Rails exploitation. Hence, the current exploit may affect Plesk-hosted websites soon.

 

Significantly, following Kingcope's Full Disclosure, a particular end-user, jtag stated that he'd unearthed an apparently large botnet exploiting the flaw for contaminating web-servers using one harmful Perl language-written IRC bot.

 

According to him, the data collected helped generate many host names understood as contaminated and these were investigated to detect vulnerable Plesk fittings. More than 900 hosts making an effort for connecting ran flawed Plesk fittings, thus substantiating that the current malware's proliferation was indeed due to the Plesk attack code.

 

Meanwhile, Trend Micro urgently suggests users of Plesk towards commenting scriptAlias /phppath/" /usr/bin/" a string from Apache's settings as also facilitate authentication on Plesk-hosted web-pages.

» SPAMfighter News - 6/15/2013

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next