Plesk

[BUG] PCI compliance scan shows a warning: CVE-2000-0649

Symptoms

Cause

Plesk bug #PPP-47782, which will be resolved in future product updates.
An attacker can create a specific HTTP1.0 request to the server and it will return the internal IP address of the host even if the server is behind a firewall or NAT, which will disclose the true internal IP address to the remote user.

Resolution

  1. Connect to the server via SSH.

  2. Set the proper and resolvable server hostname as described in the "Via CLI (Linux only)" section in this article.

  3. Create the file /etc/sw-cp-server/conf.d/server-name-plesk.inc

    # touch /etc/sw-cp-server/conf.d/server-name-plesk.inc

  4. Edit file /etc/sw-cp-server/conf.d/server-name-plesk.inc and add following content to it

    server_name example.com;
    server_name_in_redirect on;

    Where 'example.com' is the server hostname.

  5. (Optional) Disable support of the outdated HTTP 1.0 protocol:

    • Create the file /etc/sw-cp-server/conf.d/disable-http-1.0-plesk.inc

      # touch /etc/sw-cp-server/conf.d/disable-http-1.0-plesk.inc

    • Edit file /etc/sw-cp-server/conf.d/disable-http-1.0-plesk.inc and add following content to it

      if ($server_protocol = HTTP/1.0) {
      return 444;
      }

  6. Restart the sw-cp-server service:

    # service sw-cp-server restart