![]() In AWStats through 7.8, cgi-bin/?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/nf format. You can use a full path or relative path from directory. Solution Upgrade to AWStats 6.3 or higher. There are various flaws in the remote version of this software that may allow an attacker to execute code on the remote host. Description The remote host is running AWStats, a CGI log analyzer. 'LogFile' contains the web, ftp or mail server logfile to analyze. AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to . The remote host is running AWStats, a CGI log analyzer. Each directive available in the AWStats config file (.conf) is listed here (with examples and default values). ![]() ![]() NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600. ID: 16189 Name: AWStats configdir Parameter Arbitrary Command Execution Filename: awstatsconfigdir.nasl Vulnerability Published: This Plugin Published: Last Modification Time: Plugin Version: 1.28 Plugin Type: remote Plugin Family: CGI abuses Dependencies: awstatsdetect. Designed with flexibility in mind, AWStats can be run through a web browser CGI (common gateway interface) or directly from the operating system command. AWStats configuration directives/options. In AWStats through 7.7, cgi-bin/?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/nf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.Īwstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.ĪWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive. The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter.Įval injection vulnerability in in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.Ī Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the framename and update parameters.Ī in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. Update the software to the latest non-vulnerable version.NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.Ĭross-site scripting (XSS) vulnerability in in AWStats 6.8 allows remote attackers to inject arbitrary web script or HTML via the query_string, a different vulnerability than CVE-2006-3681 and CVE-2006-1945. If this signature is detected, an incident is generated in the Alert Logic console. The Network-Based Intrusion Detection System (IDS) has been updated with the new signatures for this exploit when detected via Alert Logic Threat Manager™. No authentication is required for successful exploitation of this vulnerability Alert Logic CoverageĪlert Logic® has evaluated its customer base for exposure to the exploit and has developed signatures for mitigating the threat depending on the security service in place. Here is how to run the AWStats configdir Parameter Arbitrary Command Execution as a standalone plugin via the Nessus web user interface ( Click to start a New Scan. You will need AWStats versions 6.2 and below. The injected command is passed to a pearl function without sanitization and is subsequently executed if escaped via a double-pipe (||).The attacker sends an HTTP POST request to with the ‘configdir’ parameter containing a command injection payload.An attacker is able to inject command execution payloads via crafted requests, resulting in the ability to run arbitrary commands on the target host. A remote command execution vulnerability exists in the script used in the AWStats software package. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |