Family: CGI abuses --> Category: attack
AWStats Referrer Arbitrary Command Execution Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Checks for referrer arbitrary command execution vulnerability in AWStats
Detailed Explanation for this Vulnerability Test
The remote web server contains a CGI script that allows execution of
The remote host is running AWStats, a free logfile analysis tool for
analyzing ftp, mail, web, ... traffic.
The version of AWStats installed on the remote host collects data
about the web referrers and uses them without proper sanitation in an
eval() statement. Using specially-crafted referrer data, a possible hacker
can cause arbitrary Perl code to be executed on the remote host within
the context of the affected application once the stats page has been
regenerated and when a user visits the referer statistics page.
Note that successful exploitation requires that at least one URLPlugin
See also :
Upgrade to AWStats 6.5 or later.
Medium / CVSS Base Score : 6
Click HERE for more information and discussions on this network vulnerability scan.