VID |
21893 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The AWStats software is vulnerable to a command execution vulnerability via the migrate parameter. AWStats is a freely available log analyzer that collects and graphically displays statistics from web, FTP, and mail servers. AWStats versions 6.5 and earlier could allow a remote attacker to execute arbitrary system commands, caused by improper validation of user-supplied input passed to the 'migrate' parameter of the 'awstats.pl' script when the "AllowToUpdateStatsFromBrowser" option in the AWStats site configuration file is enabled. By sending a specially-crafted HTTP request containing a pipe character followed by arbitrary shell commands in the 'migrate' parameter to the 'awstats.pl' script, a remote attacker could execute arbitrary shell commands on the affected host with the privileges of the Web server process.
* References: http://awstats.sourceforge.net/awstats_security_news.php http://www.osreviews.net/reviews/comm/awstats http://secunia.com/advisories/19969/ http://www.frsirt.com/english/advisories/2006/1678
* Platforms Affected: AWStats versions 6.5 and earlier Any operating system Any version |
Recommendation |
Upgrade to the latest version of AWStats (6.6 or later), available from the AWStats Download Web page at http://awstats.sourceforge.net/#DOWNLOAD
For Ubuntu Linux: Upgrade to the fixed version of awstats, as listed in Ubuntu Security Notice USN-285-1 at http://www.ubuntu.com/usn/usn-285-1
For Debian GNU/Linux: Upgrade to the fixed version of awstats, as listed in Debian Security Advisory DSA-1058-1 at http://www.debian.org/security/2006/dsa-1058 |
Related URL |
CVE-2006-2237 (CVE) |
Related URL |
17844 (SecurityFocus) |
Related URL |
26287 (ISS) |
|