AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.
References
Link | Resource |
---|---|
http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false | Exploit Patch Vendor Advisory |
http://awstats.sourceforge.net/docs/awstats_changelog.txt | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/272296 | Patch Third Party Advisory US Government Resource |
http://secunia.com/advisories/13893/ | Patch Vendor Advisory |
http://www.osvdb.org/13002 | |
http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf | |
http://www.securityfocus.com/bid/12298 |
Configurations
Information
Published : 2005-01-17 21:00
Updated : 2008-09-05 13:45
NVD link : CVE-2005-0116
Mitre link : CVE-2005-0116
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
awstats
- awstats