Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: CGI abuses --> Category: attack

AWStats migrate Parameter Remote File Include Vulnerability Vulnerability Scan

Vulnerability Scan Summary
Tries to run a command using AWStats

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a CGI script that allows for the
execution of arbitrary commands.

Description :

The remote host is running AWStats, a free logfile analysis tool
written in Perl.

The version of AWStats installed on the remote host fails to sanitize
input to the 'migrate' parameter before passing it to a Perl 'open()'
function. Provided 'AllowToUpdateStatsFromBrowser' is enabled in the
AWStats site configuration file, an unauthenticated attacker can
exploit this issue to execute arbitrary code on the affected host,
subject to the rights of the web server user id.

See also :

Solution :

Upgrade to AWStats version 6.6 or later.

Threat Level:

Medium / CVSS Base Score : 6

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.