Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
References
Link | Resource |
---|---|
http://secunia.com/advisories/16412 | Broken Link Patch Vendor Advisory |
http://secunia.com/advisories/17463 | Broken Link |
http://securitytracker.com/id?1014636 | Broken Link Patch Third Party Advisory VDB Entry |
http://www.debian.org/security/2005/dsa-892 | Mailing List Third Party Advisory |
http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false | Broken Link |
http://www.novell.com/linux/security/advisories/2005_19_sr.html | Broken Link |
http://www.osvdb.org/18696 | Broken Link Patch |
http://www.securiteam.com/unixfocus/5DP0J00GKE.html | Broken Link Vendor Advisory |
http://www.securityfocus.com/bid/14525 | Broken Link Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21769 | Third Party Advisory VDB Entry |
https://usn.ubuntu.com/167-1/ | Broken Link |
Configurations
History
No history.
Information
Published : 2005-08-15 04:00
Updated : 2024-02-14 16:58
NVD link : CVE-2005-1527
Mitre link : CVE-2005-1527
CVE.ORG link : CVE-2005-1527
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
awstats
- awstats
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')