CVE-2023-4931
Uncontrolled search path element vulnerability in Plesk
Severity Score
7.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Uncontrolled search path element vulnerability in Plesk Installer affects version 3.27.0.0. A local attacker could execute arbitrary code by injecting DLL files into the same folder where the application is installed, resulting in DLL hijacking in edputil.dll, samlib.dll, urlmon.dll, sspicli.dll, propsys.dll and profapi.dll files.
La vulnerabilidad del elemento de ruta de búsqueda no controlada en Plesk Installer afecta a la versión 3.27.0.0. Un atacante local podría ejecutar código arbitrario inyectando archivos DLL en la misma carpeta donde está instalada la aplicación, lo que provocaría el secuestro de DLL en los archivos edputil.dll, samlib.dll, urlmon.dll, sspicli.dll, propsys.dll y profapi.dll.
*Credits:
Alexander Huaman Jaimes
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-09-13 CVE Reserved
- 2023-11-27 CVE Published
- 2024-08-02 CVE Updated
- 2024-12-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-427: Uncontrolled Search Path Element
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/uncontrolled-search-path-element-vulnerability-plesk | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://support.plesk.com/hc/en-us/articles/17426121182103 | 2023-12-01 |