Vulnerability Description
Uncontrolled search path element vulnerability in Plesk Installer affects version 3.27.0.0. A local attacker could execute arbitrary code by injecting DLL files into the same folder where the application is installed, resulting in DLL hijacking in edputil.dll, samlib.dll, urlmon.dll, sspicli.dll, propsys.dll and profapi.dll files.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Plesk | Plesk | 3.27.0.0 |
Related Weaknesses (CWE)
References
- https://support.plesk.com/hc/en-us/articles/17426121182103Vendor Advisory
- https://www.incibe.es/en/incibe-cert/notices/aviso/uncontrolled-search-path-elemThird Party Advisory
- https://support.plesk.com/hc/en-us/articles/17426121182103Vendor Advisory
- https://www.incibe.es/en/incibe-cert/notices/aviso/uncontrolled-search-path-elemThird Party Advisory
FAQ
What is CVE-2023-4931?
CVE-2023-4931 is a vulnerability with a CVSS score of 6.3 (MEDIUM). Uncontrolled search path element vulnerability in Plesk Installer affects version 3.27.0.0. A local attacker could execute arbitrary code by injecting DLL files into the same folder where the applicat...
How severe is CVE-2023-4931?
CVE-2023-4931 has been rated MEDIUM with a CVSS base score of 6.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4931?
Check the references section above for vendor advisories and patch information. Affected products include: Plesk Plesk.