Plesk Panel 10.4.4 for Linux – CentOS 5.8 and RedHat 5.8 support – is available since March 20, 2012 through the Autoinstaller.
Archive for Plesk
Plesk Panel 10.4.4 for Linux – CentOS 5.8 and RedHat 5.8 support – is available since March 20, 2012 through the Autoinstaller.
– checking for references between IP addresses and domains with “Forwarding” hosting type in Plesk database
– validation for DUMP_TMP_D variable in /etc/psa/psa.conf file
The following bugs have been fixed:
[-] Wrong permission was set on /tmp folder after 10.4.4 MU#16 installing
[-] Error 404 at browsing “Downloads” report generated by AWStats
[-] Wrong IP subnets validation
[-] Unable to sync service plan with hosting disabled
[-] XSS injection vulnerability has been fixed in Horda
[-] XSS injection vulnerability has been fixed in Horda
Links to autoinstaller:
http://download1.parallels.com/Plesk/PP10/10.4.4/SuSE12.1/parallels_installer_v3.11.0_build120110.11_os_SuSE_12.1_i386
http://download1.parallels.com/Plesk/PP10/10.4.4/SuSE12.1/parallels_installer_v3.11.0_build120110.11_os_SuSE_12.1_x86_64
Links to major EZ templates:
http://download1.parallels.com/Plesk/PP10/10.4.4/SuSE12.1/vztemplates/pp10-suse-12.1-x86-ez.tar.gz
http://download1.parallels.com/Plesk/PP10/10.4.4/SuSE12.1/vztemplates/pp10-suse-12.1-x86_64-ez.tar.gz
Links to versionless EZ templates:
http://download1.parallels.com/Plesk/PP10/10.4/SuSE12.1/vztemplates/pp-suse-12.1-x86-ez.tar.gz
http://download1.parallels.com/Plesk/PP10/10.4/SuSE12.1/vztemplates/pp-suse-12.1-x86_64-ez.tar.gz
To simplify the process of installing Micro-updates for earlier Parallels Plesk Panel (PP) versions to PVC containers Plesk Service Team has prepared a special EZ template called ‘pp-microupdates’. The template is to be installed either on a container with PP (8.6.0 or later) or in the same transaction with other PP templates.
Plesk Panel 10.4.4 for SuSE 12.1 support – new OS version support – is available since Mart 14, 2012 through the Autoinstaller, vzcatalog and vzup2date.
Download page: http://www.parallels.com/download/plesk/10/
Links to Autoinstaller:
http://download1.parallels.com/Plesk/PP10/10.4.4/SuSE12.1/parallels_installer_v3.11.0_build120110.11_os_SuSE_12.1_i386
http://download1.parallels.com/Plesk/PP10/10.4.4/SuSE12.1/parallels_installer_v3.11.0_build120110.11_os_SuSE_12.1_x86_64
Links to major EZ templates:
http://download1.parallels.com/Plesk/PP10/10.4.4/SuSE12.1/vztemplates/pp10-suse-12.1-x86-ez.tar.gz
http://download1.parallels.com/Plesk/PP10/10.4.4/SuSE12.1/vztemplates/pp10-suse-12.1-x86_64-ez.tar.gz
Links to versionless EZ templates:
http://download1.parallels.com/Plesk/PP10/10.4/SuSE12.1/vztemplates/pp-suse-12.1-x86-ez.tar.gz
http://download1.parallels.com/Plesk/PP10/10.4/SuSE12.1/vztemplates/pp-suse-12.1-x86_64-ez.tar.gz
New syntax is:
plesk_password_changer.php <old admin password> [new admin password] [options]
Where [options] can be:
–all – [default] reset passwords for all supported entities
–admin – reset password for admin
–resellers – reset passwords for resellers
–clients – reset passwords for clients
–domains – reset passwords for main FTP account of domains
–domainadmins – reset passwords for Domain Administrators
–users – change passwords for hosting panel users
–additionalftpaccounts – reset passwords for additional FTP accounts for domains
–subdomains – reset passwords for subdomains. NOTE: For Plesk 10.x subdomains treated as domains.
–webusers – reset passwords for Web Users
–mailaccounts – reset passwords for mail accounts
For example, next command
"%plesk_dir%additionalPleskPHP5php.exe" -d safe_mode=0 plesk_password_changer.php setup s3$ret! --admin --clients
means that passwords for admin and clients will be reset, password for admin will be "s3$ret!" (without quotes)
Plesk Service Team is pleased to introduce the PHP 5.x EZ template that allows you to update PHP up to version 5.3 on installed Plesk server.
Plesk Service Team is pleased to introduce the PBA-S+Plesk Mass Password Reset Script.
In case Plesk Panel is registered as a Plesk node in PBA-S, after resetting passwords with plesk_password_changer, integration between Plesk and PBA-S will be affected.
In order to recover integration with Plesk you need to run the following script – reset_plesk_passwords.pl – on the PBA-S management node.
This script will change passwords for Plesk instances that are stored in PBA-S database as well as admin password that is used for connecting to Plesk node.
[+] phpMyAdmin has been updated to version 3.4.10.1
The following bugs have been fixed:
[-] Can’t modify database through phpMyAdmin 3.4.9
Plesk Service Team is pleased to introduce the PBAS+Plesk Mass Password Reset Script.
In case Plesk Panel is registered as a Plesk node in PBAS, after resetting passwords with plesk_password_changer, integration between Plesk and PBAS will be affected.
In order to recover integration with Plesk you need to run the following script – reset_plesk_passwords.pl – on the PBAS management node.
This script will change passwords for Plesk instances that are stored in PBAS database as well as admin password that is used for connecting to Plesk node.
Plesk Service team is pleased to introduce the ‘plesk_remote_vulnerability_checker’ script that is intended to allow Plesk owners to find out if their server with Plesk Panel 8.x, 9.x, 10.0, 10.1, 10.2 or 10.3 is vulnerable.
Plesk Service team is pleased to introduce the ‘plesk_remote_vulnerability_checker’ script that is intended to allow Plesk owners to find out if their server with Plesk Panel 8.x, 9.x, 10.0, 10.1, 10.2 or 10.3 is vulnerable.
The following bugs have been fixed:
[-] Panel security vulnerability
The following bugs have been fixed:
Note about 2Gb files size limit at upload backup file using Panel UI has been added
Autoinstaller on windows hangs on at executing during upgrade
Multiple Cross-Site Scripting in Panel
Unexpected error is reported by websrvmng on adding already existed MIME type
Watchdog notifications doesn’t pass SPF handler
Plesk Service Team is pleased to introduce the Plesk Mass Password Reset Script.
The script is designed to allow Plesk owners to reset passwords of all accounts in Plesk by an automated way.
The following bugs have been fixed:
[-] Cannot access Plesk Panel installed on Virtuozzo
[-] Plesk allows to create few customers with same email.
[-] Cannot change contact info of customer with error “User with such e-mail address already exists in the system”
The following bugs have been fixed:
[-] XSS vulnerability in Horde.
The following bugs have been fixed:
[-] XSS vulnerability in Horde.
Plesk Service Team is pleased to introduce the Plesk Mass Migration Script.
The script is designed to allow providers migrating Plesk farm by an automated way.
Also, it does implement per-domain backup algorithm that reduces disk space usage and memory consumption.
The Plesk Service Team is pleased to introduce the Plesk Mirror Setup Tool.
The tool is designed to setup and manage a local Plesk 10 repository (mirror) for using in Provider’s internal network environment.
Main feature set allows the providers to manage selected Plesk versions and OSes.
Also, the tool offers an interface for managing pre-launch testing of the upcoming Plesk release.
[+] Helm migration agent has been updated.
The following bugs have been fixed:
[-] Migration via API-RPC fails with PHP fatal error: Class ‘Db_Table_Broker_ServiceNode’ not found in /usr/local/psa/admin/plib/Db/Table/Broker.php on line 42
[-] Unable to migrate site with unicode domain name with error "The element ‘domain’ has multiply elements ‘mailsystem’"
[-] Scheduled backup fails on suspending domain with "Bad session type."
[-] Switched off autoresponder is migrated to switched on auto-reply
Plesk Service team is pleased to inform you the vulnerability has been completely fixed in most versions of the Plesk. Plesk 10.x are completely covered by Micro-updates. Plesk 8.6 and 9.5 on Linux are also fixed by Micro-updates. For other version Custom Fixes are available.
Please refer to http://kb.parallels.com/en/113321.
The following bugs have been fixed:
[-] SQL injection vulnerability that allows anonymous attacker remotely compromise Plesk server has been fixed.
The following bugs have been fixed:
[-] SQL injection vulnerability that allows anonymous attacker remotely compromise Plesk server has been fixed.