CVE-2006-2237

The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter.
References
Link Resource
http://awstats.sourceforge.net/awstats_security_news.php
http://secunia.com/advisories/19969 Patch Vendor Advisory
http://secunia.com/advisories/20170
http://secunia.com/advisories/20186
http://secunia.com/advisories/20496
http://secunia.com/advisories/20710
http://security.gentoo.org/glsa/glsa-200606-06.xml
http://www.debian.org/security/2006/dsa-1058
http://www.novell.com/linux/security/advisories/2006_33_awstats.html
http://www.osreviews.net/reviews/comm/awstats
http://www.osvdb.org/25284 Patch
http://www.securityfocus.com/bid/17844
http://www.vupen.com/english/advisories/2006/1678
http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/26287
https://usn.ubuntu.com/285-1/
http://awstats.sourceforge.net/awstats_security_news.php
http://secunia.com/advisories/19969 Patch Vendor Advisory
http://secunia.com/advisories/20170
http://secunia.com/advisories/20186
http://secunia.com/advisories/20496
http://secunia.com/advisories/20710
http://security.gentoo.org/glsa/glsa-200606-06.xml
http://www.debian.org/security/2006/dsa-1058
http://www.novell.com/linux/security/advisories/2006_33_awstats.html
http://www.osreviews.net/reviews/comm/awstats
http://www.osvdb.org/25284 Patch
http://www.securityfocus.com/bid/17844
http://www.vupen.com/english/advisories/2006/1678
http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/26287
https://usn.ubuntu.com/285-1/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*
cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:10

Type Values Removed Values Added
References () http://awstats.sourceforge.net/awstats_security_news.php - () http://awstats.sourceforge.net/awstats_security_news.php -
References () http://secunia.com/advisories/19969 - Patch, Vendor Advisory () http://secunia.com/advisories/19969 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20170 - () http://secunia.com/advisories/20170 -
References () http://secunia.com/advisories/20186 - () http://secunia.com/advisories/20186 -
References () http://secunia.com/advisories/20496 - () http://secunia.com/advisories/20496 -
References () http://secunia.com/advisories/20710 - () http://secunia.com/advisories/20710 -
References () http://security.gentoo.org/glsa/glsa-200606-06.xml - () http://security.gentoo.org/glsa/glsa-200606-06.xml -
References () http://www.debian.org/security/2006/dsa-1058 - () http://www.debian.org/security/2006/dsa-1058 -
References () http://www.novell.com/linux/security/advisories/2006_33_awstats.html - () http://www.novell.com/linux/security/advisories/2006_33_awstats.html -
References () http://www.osreviews.net/reviews/comm/awstats - () http://www.osreviews.net/reviews/comm/awstats -
References () http://www.osvdb.org/25284 - Patch () http://www.osvdb.org/25284 - Patch
References () http://www.securityfocus.com/bid/17844 - () http://www.securityfocus.com/bid/17844 -
References () http://www.vupen.com/english/advisories/2006/1678 - () http://www.vupen.com/english/advisories/2006/1678 -
References () http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html - () http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/26287 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/26287 -
References () https://usn.ubuntu.com/285-1/ - () https://usn.ubuntu.com/285-1/ -

Information

Published : 2006-05-08 23:02

Updated : 2024-11-21 00:10


NVD link : CVE-2006-2237

Mitre link : CVE-2006-2237

CVE.ORG link : CVE-2006-2237


JSON object : View

Products Affected

awstats

  • awstats