|
Family: CGI abuses --> Category: attack
AWStats Referrer Arbitrary Command Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for referrer arbitrary command execution vulnerability in AWStats
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a CGI script that allows execution of
arbitrary commands.
Description :
The remote host is running AWStats, a free logfile analysis tool for
analyzing ftp, mail, web, ... traffic.
The version of AWStats installed on the remote host collects data
about the web referrers and uses them without proper sanitation in an
eval() statement. Using specially-crafted referrer data, a possible hacker
can cause arbitrary Perl code to be executed on the remote host within
the context of the affected application once the stats page has been
regenerated and when a user visits the referer statistics page.
Note that successful exploitation requires that at least one URLPlugin
be enabled.
See also :
http://www.idefense.com/application/poi/display?id=290
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0239.html
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0371.html
Solution :
Upgrade to AWStats 6.5 or later.
Threat Level:
Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|