CVE-2010-4367
Summary
| CVE | CVE-2010-4367 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2010-12-02 16:22:00 UTC |
| Updated | 2011-02-23 06:47:00 UTC |
| Description | awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server. |
Risk And Classification
Problem Types: CWE-94
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Awstats | Awstats | 1.0 | All | All | All |
| Application | Awstats | Awstats | 2.1. | All | All | All |
| Application | Awstats | Awstats | 2.2.3 | All | All | All |
| Application | Awstats | Awstats | 2.2.4 | All | All | All |
| Application | Awstats | Awstats | 3.0 | All | All | All |
| Application | Awstats | Awstats | 3.1 | All | All | All |
| Application | Awstats | Awstats | 3.2 | All | All | All |
| Application | Awstats | Awstats | 4.0 | All | All | All |
| Application | Awstats | Awstats | 4.1 | All | All | All |
| Application | Awstats | Awstats | 5.0 | All | All | All |
| Application | Awstats | Awstats | 5.1 | All | All | All |
| Application | Awstats | Awstats | 5.2 | All | All | All |
| Application | Awstats | Awstats | 5.3 | All | All | All |
| Application | Awstats | Awstats | 5.4 | All | All | All |
| Application | Awstats | Awstats | 5.5 | All | All | All |
| Application | Awstats | Awstats | 5.6 | All | All | All |
| Application | Awstats | Awstats | 5.7 | All | All | All |
| Application | Awstats | Awstats | 5.8 | All | All | All |
| Application | Awstats | Awstats | 5.9 | All | All | All |
| Application | Awstats | Awstats | 6.0 | All | All | All |
| Application | Awstats | Awstats | 6.1 | All | All | All |
| Application | Awstats | Awstats | 6.2 | All | All | All |
| Application | Awstats | Awstats | 6.3 | All | All | All |
| Application | Awstats | Awstats | 6.4 | All | All | All |
| Application | Awstats | Awstats | 6.4_1 | All | All | All |
| Application | Awstats | Awstats | 6.4_1 | sarge1 | All | All |
| Application | Awstats | Awstats | 6.5 | All | All | All |
| Application | Awstats | Awstats | 6.5_1 | All | All | All |
| Application | Awstats | Awstats | 6.5_1.857 | All | All | All |
| Application | Awstats | Awstats | 6.6 | All | All | All |
| Application | Awstats | Awstats | 6.7 | All | All | All |
| Application | Awstats | Awstats | 6.8 | All | All | All |
| Application | Awstats | Awstats | 6.9 | All | All | All |
| Application | Awstats | Awstats | 1.0 | All | All | All |
| Application | Awstats | Awstats | 2.1. | All | All | All |
| Application | Awstats | Awstats | 2.2.3 | All | All | All |
| Application | Awstats | Awstats | 2.2.4 | All | All | All |
| Application | Awstats | Awstats | 3.0 | All | All | All |
| Application | Awstats | Awstats | 3.1 | All | All | All |
| Application | Awstats | Awstats | 3.2 | All | All | All |
| Application | Awstats | Awstats | 4.0 | All | All | All |
| Application | Awstats | Awstats | 4.1 | All | All | All |
| Application | Awstats | Awstats | 5.0 | All | All | All |
| Application | Awstats | Awstats | 5.1 | All | All | All |
| Application | Awstats | Awstats | 5.2 | All | All | All |
| Application | Awstats | Awstats | 5.3 | All | All | All |
| Application | Awstats | Awstats | 5.4 | All | All | All |
| Application | Awstats | Awstats | 5.5 | All | All | All |
| Application | Awstats | Awstats | 5.6 | All | All | All |
| Application | Awstats | Awstats | 5.7 | All | All | All |
| Application | Awstats | Awstats | 5.8 | All | All | All |
| Application | Awstats | Awstats | 5.9 | All | All | All |
| Application | Awstats | Awstats | 6.0 | All | All | All |
| Application | Awstats | Awstats | 6.1 | All | All | All |
| Application | Awstats | Awstats | 6.2 | All | All | All |
| Application | Awstats | Awstats | 6.3 | All | All | All |
| Application | Awstats | Awstats | 6.4 | All | All | All |
| Application | Awstats | Awstats | 6.4_1 | All | All | All |
| Application | Awstats | Awstats | 6.4_1 | sarge1 | All | All |
| Application | Awstats | Awstats | 6.5 | All | All | All |
| Application | Awstats | Awstats | 6.5_1 | All | All | All |
| Application | Awstats | Awstats | 6.5_1.857 | All | All | All |
| Application | Awstats | Awstats | 6.6 | All | All | All |
| Application | Awstats | Awstats | 6.7 | All | All | All |
| Application | Awstats | Awstats | 6.8 | All | All | All |
| Application | Awstats | Awstats | 6.9 | All | All | All |
| Application | Awstats | Awstats | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Support / Security / Advisories / / MDVSA-2011:033 | Mandriva | MANDRIVA | www.mandriva.com | |
| awstats.sourceforge.net/docs/awstats_changelog.txt | CONFIRM | awstats.sourceforge.net | |
| www.ExploitDevelopment.com - 2010-WEB-001 - AWStats 6.95 and Older Remote Command Execution When Installed on Windows Apache Tomcat | MISC | www.exploitdevelopment.com | Exploit |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.