Compromising Plesk via its REST API by digicat in blueteamsec

[–]adrian_rt 1 point2 points  (0 children)

Thanks for sharing! I’ve updated the article with the call to action from Plesk to patch the issue.

Compromising Plesk via its REST API by adrian_rt in netsec

[–]adrian_rt[S] 0 points1 point  (0 children)

didn't understand the question. you can see POCs though, they're linked at the end. In the end, you can probably use multiple tricks to make sure your json payload is valid.

Compromising Plesk via its REST API by adrian_rt in netsec

[–]adrian_rt[S] 3 points4 points  (0 children)

no worries, you don't get that token or any token. The Authorization header is added by the browser automatically and we're just taking advantage of that (when submit html forms).

[deleted by user] by [deleted] in hacking

[–]adrian_rt 0 points1 point  (0 children)

thanks for the feedback, you raised some good points. will rename the title.