Korean
<< Back
VID 21893
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The AWStats software is vulnerable to a command execution vulnerability via the migrate parameter. AWStats is a freely available log analyzer that collects and graphically displays statistics from web, FTP, and mail servers. AWStats versions 6.5 and earlier could allow a remote attacker to execute arbitrary system commands, caused by improper validation of user-supplied input passed to the 'migrate' parameter of the 'awstats.pl' script when the "AllowToUpdateStatsFromBrowser" option in the AWStats site configuration file is enabled. By sending a specially-crafted HTTP request containing a pipe character followed by arbitrary shell commands in the 'migrate' parameter to the 'awstats.pl' script, a remote attacker could execute arbitrary shell commands on the affected host with the privileges of the Web server process.

* References:
http://awstats.sourceforge.net/awstats_security_news.php
http://www.osreviews.net/reviews/comm/awstats
http://secunia.com/advisories/19969/
http://www.frsirt.com/english/advisories/2006/1678

* Platforms Affected:
AWStats versions 6.5 and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of AWStats (6.6 or later), available from the AWStats Download Web page at http://awstats.sourceforge.net/#DOWNLOAD

For Ubuntu Linux:
Upgrade to the fixed version of awstats, as listed in Ubuntu Security Notice USN-285-1 at http://www.ubuntu.com/usn/usn-285-1

For Debian GNU/Linux:
Upgrade to the fixed version of awstats, as listed in Debian Security Advisory DSA-1058-1 at http://www.debian.org/security/2006/dsa-1058
Related URL CVE-2006-2237 (CVE)
Related URL 17844 (SecurityFocus)
Related URL 26287 (ISS)