Family: CGI abuses --> Category: attack
AWStats migrate Parameter Remote File Include Vulnerability Vulnerability Scan
Vulnerability Scan Summary
Tries to run a command using AWStats
Detailed Explanation for this Vulnerability Test
The remote web server contains a CGI script that allows for the
execution of arbitrary commands.
The remote host is running AWStats, a free logfile analysis tool
written in Perl.
The version of AWStats installed on the remote host fails to sanitize
input to the 'migrate' parameter before passing it to a Perl 'open()'
function. Provided 'AllowToUpdateStatsFromBrowser' is enabled in the
AWStats site configuration file, an unauthenticated attacker can
exploit this issue to execute arbitrary code on the affected host,
subject to the rights of the web server user id.
See also :
Upgrade to AWStats version 6.6 or later.
Medium / CVSS Base Score : 6
Click HERE for more information and discussions on this network vulnerability scan.