Lucene search

K
freebsdFreeBSD0F5A2B4D-694B-11D9-A9E7-0001020EED82
HistoryOct 21, 2004 - 12:00 a.m.

awstats -- remote command execution vulnerability

2004-10-2100:00:00
vuxml.freebsd.org
13

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.972 High

EPSS

Percentile

99.8%

An iDEFENSE Security Advisory reports:

Remote exploitation of an input validation vulnerability
in AWStats allows attackers to execute arbitrary commands
under the privileges of the web server.
The problem specifically exists when the application is
running as a CGI script on a web server. The “configdir”
parameter contains unfiltered user-supplied data that is
utilized in a call to the Perl routine open()…
Successful exploitation allows remote attackers to
execute arbitrary commands under the privileges of the web
server. This can lead to further compromise as it provides
remote attackers with local access.

OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchawstats< 6.3UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.972 High

EPSS

Percentile

99.8%