Article ID: 2169, created on Feb 12, 2009, last review on May 11, 2014

  • Applies to:
  • Plesk 8.2 for Linux/Unix
  • Plesk 8.1 for Linux/Unix
  • Plesk 8.0 for Linux/Unix


NOTE: The issue has been completely fixed in Plesk 8.3.

This vulnerability allows anonymous attackers to compromise Plesk application remotely.


Download one of the following files:

For Plesk v. 8.0.0 and v. 8.0.1:
MD5 (class.Session.php) = 4d917ed483cbf030fb122a1e214b2bbf

For Plesk v. 8.1.0:
MD5 (class.Session.php) = 4de3b2fc50011d27fb13e5a293720100

For Plesk v. 8.2.0:
MD5 (class.Session.php) = 5b7a8071374aa94b83697aec72d1d556

and replace the /usr/local/psa/admin/plib/class.Session.php file on the Plesk server with the new, downloaded one. Make sure that md5sum and file permissions are correct. For example:


# wget

# md5sum  ./class.Session.php
MD5 (./class.Session.php) = 5b7a8071374aa94b83697aec72d1d556

# cp /usr/local/psa/admin/plib/class.Session.php /usr/local/psa/admin/plib/class.Session.php.old

# cp ./class.Session.php /usr/local/psa/admin/plib/class.Session.php

# chmod 644 /usr/local/psa/admin/plib/class.Session.php

# chown root:psaadm /usr/local/psa/admin/plib/class.Session.php

# /usr/local/psa/admin/bin/httpsdctl restart

a914db3fdc7a53ddcfd1b2db8f5a1b9c 583c136e45a1f548d12213fea9b7833d 29d1e90fd304f01e6420fbe60f66f838 b8ef5052d936e902043e41759118114e 5dd10e4b1e2dd7a2aa8a50c580dd41a2 47085b48068f187235a1eb6bafa960e5 56797cefb1efc9130f7c48a7d1db0f0c

Email subscription for changes to this article
Save as PDF