Korean
<< Back
VID 21529
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The AWStats is vulnerable to an arbitrary command execution vulnerability in the configdir parameter. AWStats is a freely available log analyzer that collects and graphically displays statistics from web, FTP, and mail servers. AWStats versions 5.7 through 6.2 could allow a remote attacker to execute arbitrary commands on the system, caused by improper filtering of user-supplied input in the 'configdir' parameter in the 'awstats.pl' script. By sending a specially-crafted request containing commands with the '|' characters in the 'configdir' parameter of the 'awstats.pl' script, a remote attacker could execute arbitrary commands on the system with privileges of the Web server.

* References:
http://www.ciac.org/ciac/bulletins/p-140.shtml
http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities
http://www.kb.cert.org/vuls/id/272296
http://secunia.com/advisories/13893/

* Platforms Affected:
AWStats versions 5.7 through 6.2
Any operating system Any version
Recommendation Upgrade to the latest version of AWStats (6.4 or later), available from the AWStats Download Web page at http://awstats.sourceforge.net/#DOWNLOAD

For Debian GNU/Linux 3.0 (woody):
Upgrade to the latest version of awstats (4.0-0.woody.2 or later), as listed in Debian Security Advisory DSA-682-1 at http://www.debian.org/security/2005/dsa-682

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2005-0116 (CVE)
Related URL 12270,12298 (SecurityFocus)
Related URL 18912,19058 (ISS)