{"id":124,"date":"2012-03-01T19:43:09","date_gmt":"2012-03-01T19:43:09","guid":{"rendered":"http:\/\/www.securitymonitoringblog.de\/bsk-consulting\/?p=124"},"modified":"2024-08-28T17:03:33","modified_gmt":"2024-08-28T15:03:33","slug":"plesk-sicherheitsproblem-mit-microupdates-losen","status":"publish","type":"post","link":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/","title":{"rendered":"Plesk Sicherheitsproblem mit Microupdates l\u00f6sen"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.18.0&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]Ein Sicherheitsproblem im Server-Management-Werkzeug Plesk bedroht viele \u00fcber dieses System gemanagte Serversysteme. In einem heute ver\u00f6ffentlichten <a title=\"heise Artikel Plesk\" href=\"http:\/\/www.heise.de\/security\/meldung\/Fehler-in-Admin-Software-Plesk-wird-aktiv-ausgenutzt-1446521.html\" target=\"_blank\" rel=\"noopener noreferrer\">heise-Alert<\/a> wird das Problem beschrieben und auch auf die <a title=\"Plesk Workarounds \" href=\"http:\/\/kb.parallels.com\/en\/9294\" target=\"_blank\" rel=\"noopener noreferrer\">Workarounds f\u00fcr \u00e4ltere Systeme <\/a>verlinkt. Die L\u00fccke wird nach Angaben heises bereits aktiv ausgenutzt.<br \/>\nAlte Plesk Versionen k\u00f6nnen mit Hilfe des &#8220;Autoinstallers&#8221; f\u00fcr Micro-Updates mit dem Fix versorgt werden.<br \/>\nKonkret empfiehlt sich folgendes Vorgehen:<br \/>\n1. Plesk Home Directory finden bzw. Version feststellen<\/p>\n<pre>dpkg -l | grep plesk <\/pre>\n<p>bzw.<\/p>\n<pre>find \/ -name \"autoinstaller*\"<\/pre>\n<p>2. In das &#8220;sbin&#8221; Verzeichnis wechseln<br \/>\nz.B.<\/p>\n<pre>cd\u00a0\/opt\/psa\/admin\/sbin\/<\/pre>\n<p>3. dann folgenden Befehl ausf\u00fchren<\/p>\n<pre>autoinstaller --select-product-id plesk --select-release-current --reinstall-patch --install-component base<\/pre>\n<p>Auf diese Weise k\u00f6nnen Sie Ihre Plesk Installation schnell fixen.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ein Sicherheitsproblem im Server-Management-Werkzeug Plesk bedroht viele \u00fcber dieses System gemanagte Serversysteme. In einem heute ver\u00f6ffentlichten heise-Alert wird das Problem beschrieben und auch auf die Workarounds f\u00fcr \u00e4ltere Systeme verlinkt. Die L\u00fccke wird nach Angaben heises bereits aktiv ausgenutzt. Alte Plesk Versionen k\u00f6nnen mit Hilfe des &#8220;Autoinstallers&#8221; f\u00fcr Micro-Updates mit dem Fix versorgt werden. Konkret empfiehlt sich folgendes Vorgehen: 1. Plesk Home Directory finden bzw. Version feststellen dpkg -l | grep plesk bzw. find \/ -name &#8220;autoinstaller*&#8221; 2. In das &#8220;sbin&#8221; Verzeichnis wechseln z.B. cd\u00a0\/opt\/psa\/admin\/sbin\/ 3. dann folgenden Befehl ausf\u00fchren autoinstaller &#8211;select-product-id plesk &#8211;select-release-current &#8211;reinstall-patch &#8211;install-component base Auf diese Weise k\u00f6nnen Sie Ihre Plesk Installation schnell fixen.<\/p>\n","protected":false},"author":1,"featured_media":129,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Ein Sicherheitsproblem im Server-Management-Werkzeug Plesk bedroht viele \u00fcber dieses System gemanagte Serversysteme. In einem heute ver\u00f6ffentlichten <a title=\"heise Artikel Plesk\" href=\"http:\/\/www.heise.de\/security\/meldung\/Fehler-in-Admin-Software-Plesk-wird-aktiv-ausgenutzt-1446521.html\" target=\"_blank\" rel=\"noopener noreferrer\">heise-Alert<\/a> wird das Problem beschrieben und auch auf die <a title=\"Plesk Workarounds \" href=\"http:\/\/kb.parallels.com\/en\/9294\" target=\"_blank\" rel=\"noopener noreferrer\">Workarounds f\u00fcr \u00e4ltere Systeme <\/a>verlinkt. Die L\u00fccke wird nach Angaben heises bereits aktiv ausgenutzt.\r\nAlte Plesk Versionen k\u00f6nnen mit Hilfe des \"Autoinstallers\" f\u00fcr Micro-Updates mit dem Fix versorgt werden.\r\nKonkret empfiehlt sich folgendes Vorgehen:\r\n1. Plesk Home Directory finden bzw. Version feststellen\r\n[cc lang=\"bash\"]dpkg -l | grep plesk [\/cc]\r\nbzw.\r\n[cc lang=\"bash\"]find \/ -name \"autoinstaller*\"[\/cc]\r\n2. In das \"sbin\" Verzeichnis wechseln\r\nz.B.\r\n[cc lang=\"bash\"]cd\u00a0\/opt\/psa\/admin\/sbin\/[\/cc]\r\n3. dann folgenden Befehl ausf\u00fchren\r\n[cc lang=\"bash\"]autoinstaller --select-product-id plesk --select-release-current --reinstall-patch --install-component base[\/cc]\r\nAuf diese Weise k\u00f6nnen Sie Ihre Plesk Installation schnell fixen.\r\n\u00a0","_et_gb_content_width":"","footnotes":""},"categories":[327,255,335,269],"tags":[328,329,330,331,332,333,334,278,95],"class_list":["post-124","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-alert","category-command-line","category-security-fix","category-tutorial","tag-command","tag-finden","tag-fix","tag-installieren","tag-line","tag-micro","tag-plesk","tag-security","tag-updates"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Plesk Sicherheitsproblem mit Microupdates l\u00f6sen - Nextron Systems<\/title>\n<meta name=\"description\" content=\"Schnelle Schritt-f\u00fcr-Schritt-Anleitung f\u00fcr das Beheben des Plesk-Sicherheitsproblems mit Microupdates.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/\"},\"author\":{\"name\":\"Florian Roth\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\"},\"headline\":\"Plesk Sicherheitsproblem mit Microupdates l\u00f6sen\",\"datePublished\":\"2012-03-01T19:43:09+00:00\",\"dateModified\":\"2024-08-28T15:03:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/\"},\"wordCount\":224,\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/screenshot.110.jpg\",\"keywords\":[\"command\",\"finden\",\"fix\",\"installieren\",\"line\",\"micro\",\"Plesk\",\"security\",\"updates\"],\"articleSection\":[\"Alert\",\"Command Line\",\"Security Fix\",\"Tutorial\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/\",\"url\":\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/\",\"name\":\"Plesk Sicherheitsproblem mit Microupdates l\u00f6sen - Nextron Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/screenshot.110.jpg\",\"datePublished\":\"2012-03-01T19:43:09+00:00\",\"dateModified\":\"2024-08-28T15:03:33+00:00\",\"description\":\"Schnelle Schritt-f\u00fcr-Schritt-Anleitung f\u00fcr das Beheben des Plesk-Sicherheitsproblems mit Microupdates.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#primaryimage\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/screenshot.110.jpg\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/screenshot.110.jpg\",\"width\":594,\"height\":351},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.nextron-systems.com\/#website\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"name\":\"Nextron Systems\",\"description\":\"We Detect Hackers\",\"publisher\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.nextron-systems.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.nextron-systems.com\/#organization\",\"name\":\"Nextron Systems GmbH\",\"url\":\"https:\/\/www.nextron-systems.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"contentUrl\":\"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png\",\"width\":260,\"height\":260,\"caption\":\"Nextron Systems GmbH\"},\"image\":{\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919\",\"name\":\"Florian Roth\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g\",\"caption\":\"Florian Roth\"},\"description\":\"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.\",\"url\":\"https:\/\/www.nextron-systems.com\/author\/florian\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Plesk Sicherheitsproblem mit Microupdates l\u00f6sen - Nextron Systems","description":"Schnelle Schritt-f\u00fcr-Schritt-Anleitung f\u00fcr das Beheben des Plesk-Sicherheitsproblems mit Microupdates.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#article","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/"},"author":{"name":"Florian Roth","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919"},"headline":"Plesk Sicherheitsproblem mit Microupdates l\u00f6sen","datePublished":"2012-03-01T19:43:09+00:00","dateModified":"2024-08-28T15:03:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/"},"wordCount":224,"publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/screenshot.110.jpg","keywords":["command","finden","fix","installieren","line","micro","Plesk","security","updates"],"articleSection":["Alert","Command Line","Security Fix","Tutorial"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/","url":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/","name":"Plesk Sicherheitsproblem mit Microupdates l\u00f6sen - Nextron Systems","isPartOf":{"@id":"https:\/\/www.nextron-systems.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#primaryimage"},"image":{"@id":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/screenshot.110.jpg","datePublished":"2012-03-01T19:43:09+00:00","dateModified":"2024-08-28T15:03:33+00:00","description":"Schnelle Schritt-f\u00fcr-Schritt-Anleitung f\u00fcr das Beheben des Plesk-Sicherheitsproblems mit Microupdates.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/2012\/03\/01\/plesk-sicherheitsproblem-mit-microupdates-losen\/#primaryimage","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/screenshot.110.jpg","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2012\/03\/screenshot.110.jpg","width":594,"height":351},{"@type":"WebSite","@id":"https:\/\/www.nextron-systems.com\/#website","url":"https:\/\/www.nextron-systems.com\/","name":"Nextron Systems","description":"We Detect Hackers","publisher":{"@id":"https:\/\/www.nextron-systems.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.nextron-systems.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.nextron-systems.com\/#organization","name":"Nextron Systems GmbH","url":"https:\/\/www.nextron-systems.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","contentUrl":"https:\/\/www.nextron-systems.com\/wp-content\/uploads\/2017\/11\/Nextron_0.2s_inv_symbol_only.png","width":260,"height":260,"caption":"Nextron Systems GmbH"},"image":{"@id":"https:\/\/www.nextron-systems.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/4fd503007d60aabaf1ae747502f36919","name":"Florian Roth","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.nextron-systems.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0dfaa838ce5d82e2e7bfa75ed3f43ae5?s=96&d=mm&r=g","caption":"Florian Roth"},"description":"Florian Roth serves as the Head of Research and Development at Nextron Systems. With a background in IT security since 2000, he has delved deep into nation-state cyber attacks since 2012. Florian has developed the THOR Scanner and actively engages with the community via his Twitter handle @cyb3rops. He has contributed to open-source projects, including 'Sigma', a generic SIEM rule format, and 'LOKI', an open-source scanner. Additionally, he has shared valuable resources like a mapping of APT groups and operations and an Antivirus Event Analysis Cheat Sheet.","url":"https:\/\/www.nextron-systems.com\/author\/florian\/"}]}},"_links":{"self":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":5,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/124\/revisions"}],"predecessor-version":[{"id":23569,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/posts\/124\/revisions\/23569"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media\/129"}],"wp:attachment":[{"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/media?parent=124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/categories?post=124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nextron-systems.com\/wp-json\/wp\/v2\/tags?post=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}