AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910 - | |
References | () http://secunia.com/advisories/20164 - Vendor Advisory | |
References | () http://secunia.com/advisories/20283 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/20502 - | |
References | () http://secunia.com/advisories/20710 - | |
References | () http://www.debian.org/security/2006/dsa-1075 - Patch | |
References | () http://www.novell.com/linux/security/advisories/2006_33_awstats.html - | |
References | () http://www.osreviews.net/reviews/comm/awstats - Patch | |
References | () http://www.securityfocus.com/bid/18327 - | |
References | () http://www.vupen.com/english/advisories/2006/1998 - | |
References | () https://usn.ubuntu.com/290-1/ - |
Information
Published : 2006-05-30 10:02
Updated : 2024-11-21 00:11
NVD link : CVE-2006-2644
Mitre link : CVE-2006-2644
CVE.ORG link : CVE-2006-2644
JSON object : View
Products Affected
awstats
- awstats
CWE