ID

VAR-201304-0137


CVE

CVE-2013-0133


TITLE

Plesk Panel 11.0.9 privilege escalation vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#310500

DESCRIPTION

Untrusted search path vulnerability in /usr/local/psa/admin/sbin/wrapper in Parallels Plesk Panel 11.0.9 allows local users to gain privileges via a crafted PATH environment variable. Plesk Panel 11.0.9 and possibly earlier versions contains multiple privilege escalation vulnerabilities. Parallels Plesk Panel is a web hosting control panel with integrated web design, SaaS marketplace and payment system. The program / usr / local / psa / admin / sbin / wrapper allows the user psaadm to execute various management scripts with root permissions. These scripts do not specify the full path when calling external programs. By specifying a malicious PATH environment variable, an attacker can make these management The script executes malicious programs controlled by the attacker, leading to elevated privileges. Parallels Plesk Panel is prone to a local privilege-escalation vulnerability. Local attackers can exploit this issue to execute arbitrary code with root privileges. Parallels Plesk Panel 11.0.9 is vulnerable; other versions may also be vulnerable

Trust: 3.15

sources: NVD: CVE-2013-0133 // CERT/CC: VU#310500 // JVNDB: JVNDB-2013-002405 // CNVD: CNVD-2013-03031 // BID: 59016

IOT TAXONOMY

category:['ICS']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-03031

AFFECTED PRODUCTS

vendor:parallelsmodel:plesk panelscope:eqversion:11.0.9

Trust: 1.6

vendor:parallels holdingsmodel: - scope: - version: -

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:10.x for linux

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:11.x for linux

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:8.x for linux/unix

Trust: 0.8

vendor:parallelsmodel:plesk panelscope:eqversion:9.x for linux/unix

Trust: 0.8

vendor:parallelsmodel:holdings ltd plesk panelscope:eqversion:11.0.9

Trust: 0.6

sources: CERT/CC: VU#310500 // CNVD: CNVD-2013-03031 // JVNDB: JVNDB-2013-002405 // CNNVD: CNNVD-201304-171 // NVD: CVE-2013-0133

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-0133
value: HIGH

Trust: 1.0

NVD: CVE-2013-0133
value: HIGH

Trust: 0.8

CNVD: CNVD-2013-03031
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201304-171
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2013-0133
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2013-03031
severity: MEDIUM
baseScore: 4.4
vectorString: AV:L/AC:M/AU:S/C:C/I:N/A:N
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.7
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

sources: CNVD: CNVD-2013-03031 // JVNDB: JVNDB-2013-002405 // CNNVD: CNNVD-201304-171 // NVD: CVE-2013-0133

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:CWE-Other

Trust: 0.8

sources: JVNDB: JVNDB-2013-002405 // NVD: CVE-2013-0133

THREAT TYPE

local

Trust: 0.9

sources: BID: 59016 // CNNVD: CNNVD-201304-171

TYPE

Unknown

Trust: 0.3

sources: BID: 59016

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-002405

PATCH

title:記事 ID: 115942 脆弱性に関する問題 VU#310500、CVE-2013-0132、CVE-2013-0133url:http://kb.parallels.com/jp/115942/

Trust: 0.8

title:Parallels Plesk Panelurl:http://www.parallels.com/jp/products/plesk/

Trust: 0.8

sources: JVNDB: JVNDB-2013-002405

EXTERNAL IDS

db:CERT/CCid:VU#310500

Trust: 4.1

db:NVDid:CVE-2013-0133

Trust: 3.3

db:BIDid:59016

Trust: 1.5

db:JVNid:JVNVU94324985

Trust: 0.8

db:JVNDBid:JVNDB-2013-002405

Trust: 0.8

db:CNVDid:CNVD-2013-03031

Trust: 0.6

db:SECUNIAid:52998

Trust: 0.6

db:CNNVDid:CNNVD-201304-171

Trust: 0.6

sources: CERT/CC: VU#310500 // CNVD: CNVD-2013-03031 // BID: 59016 // JVNDB: JVNDB-2013-002405 // CNNVD: CNNVD-201304-171 // NVD: CVE-2013-0133

REFERENCES

url:http://www.kb.cert.org/vuls/id/310500

Trust: 3.3

url:http://kb.parallels.com/115942

Trust: 1.6

url:http://www.parallels.com/products/plesk/

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-0133

Trust: 0.8

url:http://jvn.jp/cert/jvnvu94324985/

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-0133

Trust: 0.8

url:http://secunia.com/advisories/52998

Trust: 0.6

url:http://www.securityfocus.com/bid/59016

Trust: 0.6

sources: CERT/CC: VU#310500 // CNVD: CNVD-2013-03031 // BID: 59016 // JVNDB: JVNDB-2013-002405 // CNNVD: CNNVD-201304-171 // NVD: CVE-2013-0133

CREDITS

Ronald Volgers of Pine Digital Security.

Trust: 0.9

sources: BID: 59016 // CNNVD: CNNVD-201304-171

SOURCES

db:CERT/CCid:VU#310500
db:CNVDid:CNVD-2013-03031
db:BIDid:59016
db:JVNDBid:JVNDB-2013-002405
db:CNNVDid:CNNVD-201304-171
db:NVDid:CVE-2013-0133

LAST UPDATE DATE

2025-04-11T22:48:56.596000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#310500date:2014-07-30T00:00:00
db:CNVDid:CNVD-2013-03031date:2013-04-23T00:00:00
db:BIDid:59016date:2013-04-10T00:00:00
db:JVNDBid:JVNDB-2013-002405date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-171date:2013-04-12T00:00:00
db:NVDid:CVE-2013-0133date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CERT/CCid:VU#310500date:2013-04-10T00:00:00
db:CNVDid:CNVD-2013-03031date:2013-04-15T00:00:00
db:BIDid:59016date:2013-04-10T00:00:00
db:JVNDBid:JVNDB-2013-002405date:2013-04-22T00:00:00
db:CNNVDid:CNNVD-201304-171date:2013-04-12T00:00:00
db:NVDid:CVE-2013-0133date:2013-04-18T18:55:03.803