Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

AWStats Referrer Arbitrary Command Execution Vulnerability Vulnerability Scan


Vulnerability Scan Summary
Checks for referrer arbitrary command execution vulnerability in AWStats

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a CGI script that allows execution of
arbitrary commands.

Description :

The remote host is running AWStats, a free logfile analysis tool for
analyzing ftp, mail, web, ... traffic.

The version of AWStats installed on the remote host collects data
about the web referrers and uses them without proper sanitation in an
eval() statement. Using specially-crafted referrer data, a possible hacker
can cause arbitrary Perl code to be executed on the remote host within
the context of the affected application once the stats page has been
regenerated and when a user visits the referer statistics page.

Note that successful exploitation requires that at least one URLPlugin
be enabled.

See also :

http://www.idefense.com/application/poi/display?id=290
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0239.html
http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0371.html

Solution :

Upgrade to AWStats 6.5 or later.

Threat Level:

Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.