AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.
References
Link | Resource |
---|---|
http://awstats.sourceforge.net/docs/awstats_changelog.txt | Patch Vendor Advisory |
http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf | |
http://secunia.com/advisories/13893/ | Patch Vendor Advisory |
http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities&flashstatus=false | Exploit Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/272296 | Patch Third Party Advisory US Government Resource |
http://www.osvdb.org/13002 | |
http://www.securityfocus.com/bid/12298 |
Configurations
History
No history.
Information
Published : 2005-01-18 05:00
Updated : 2008-09-05 20:45
NVD link : CVE-2005-0116
Mitre link : CVE-2005-0116
CVE.ORG link : CVE-2005-0116
JSON object : View
Products Affected
awstats
- awstats
CWE
CWE-20
Improper Input Validation