|
Family: CGI abuses --> Category: attack
AWStats migrate Parameter Remote File Include Vulnerability Vulnerability Scan
Vulnerability Scan Summary Tries to run a command using AWStats
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a CGI script that allows for the
execution of arbitrary commands.
Description :
The remote host is running AWStats, a free logfile analysis tool
written in Perl.
The version of AWStats installed on the remote host fails to sanitize
input to the 'migrate' parameter before passing it to a Perl 'open()'
function. Provided 'AllowToUpdateStatsFromBrowser' is enabled in the
AWStats site configuration file, an unauthenticated attacker can
exploit this issue to execute arbitrary code on the affected host,
subject to the rights of the web server user id.
See also :
http://www.osreviews.net/reviews/comm/awstats
http://awstats.sourceforge.net/awstats_security_news.php
Solution :
Upgrade to AWStats version 6.6 or later.
Threat Level:
Medium / CVSS Base Score : 6
(AV:R/AC:H/Au:NR/C:P/A:P/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|