
CVE-2023-24044
https://notcve.org/view.php?id=CVE-2023-24044
22 Jan 2023 — A Host Header Injection issue on the Login page of Plesk Obsidian through 18.0.49 allows attackers to redirect users to malicious websites via a Host request header. NOTE: the vendor's position is "the ability to use arbitrary domain names to access the panel is an intended feature." Un problema de inyección de encabezado de host en la página de inicio de sesión de Plesk Obsidian hasta 18.0.49 permite a los atacantes redirigir a los usuarios a sitios web maliciosos a través de un encabezado de solicitud de ... • https://github.com/Cappricio-Securities/CVE-2023-24044 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •

CVE-2022-45130
https://notcve.org/view.php?id=CVE-2022-45130
10 Nov 2022 — Plesk Obsidian allows a CSRF attack, e.g., via the /api/v2/cli/commands REST API to change an Admin password. NOTE: Obsidian is a specific version of the Plesk product: version numbers were used through version 12, and then the convention was changed so that versions are identified by names ("Obsidian"), not numbers. Plesk Obsidian permite un ataque CSRF, por ejemplo, a través de la API REST /api/v2/cli/commands para cambiar una contraseña de administrador. NOTA: Obsidian es una versión específica del produ... • https://fortbridge.co.uk/research/compromising-plesk-via-its-rest-api • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2021-35976
https://notcve.org/view.php?id=CVE-2021-35976
10 Sep 2021 — The feature to preview a website in Plesk Obsidian 18.0.0 through 18.0.32 on Linux is vulnerable to reflected XSS via the /plesk-site-preview/ PATH, aka PFSI-62467. The attacker could execute JavaScript code in the victim's browser by using the link to preview sites hosted on the server. Authentication is not required to exploit the vulnerability. La funcionalidad para previsualizar un sitio web en Plesk Obsidian 18.0.0 a 18.0.32 en Linux es vulnerable a XSS reflejado a través de /plesk-site-preview/ PATH, ... • https://support.plesk.com/hc/en-us/articles/4402990507026 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-11583
https://notcve.org/view.php?id=CVE-2020-11583
03 Aug 2020 — A GET-based XSS reflected vulnerability in Plesk Obsidian 18.0.17 allows remote unauthenticated users to inject arbitrary JavaScript, HTML, or CSS via a GET parameter. Una vulnerabilidad de tipo XSS reflejada basada en GET en Plesk Obsidian versión 18.0.17, permite a usuarios remotos no autenticados inyectar JavaScript, HTML o CSS arbitrario por medio de un parámetro GET • https://medium.com/%400x00crash/xss-reflected-in-plesk-onyx-and-obsidian-1173a3eaffb5 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •