AWStats Remote Arbitrary Command Execution Vulnerability
BID:17844
Info
AWStats Remote Arbitrary Command Execution Vulnerability
| Bugtraq ID: | 17844 |
| Class: | Input Validation Error |
| CVE: |
CVE-2006-2237 |
| Remote: | Yes |
| Local: | No |
| Published: | May 04 2006 12:00AM |
| Updated: | Jul 21 2006 08:42PM |
| Credit: | Hendrik Weimer is credited with the discovery of these vulnerabilities. |
| Vulnerable: |
Ubuntu Ubuntu Linux 5.10 powerpc Ubuntu Ubuntu Linux 5.10 i386 Ubuntu Ubuntu Linux 5.10 amd64 Ubuntu Ubuntu Linux 5.0 4 powerpc Ubuntu Ubuntu Linux 5.0 4 i386 Ubuntu Ubuntu Linux 5.0 4 amd64 S.u.S.E. Linux Professional 10.0 OSS S.u.S.E. Linux Professional 10.0 S.u.S.E. Linux Professional 9.3 x86_64 S.u.S.E. Linux Professional 9.3 S.u.S.E. Linux Professional 9.2 x86_64 S.u.S.E. Linux Professional 9.2 S.u.S.E. Linux Professional 9.1 x86_64 S.u.S.E. Linux Professional 9.1 S.u.S.E. Linux Professional 10.1 S.u.S.E. Linux Personal 10.0 OSS S.u.S.E. Linux Personal 9.3 x86_64 S.u.S.E. Linux Personal 9.3 S.u.S.E. Linux Personal 9.2 x86_64 S.u.S.E. Linux Personal 9.2 S.u.S.E. Linux Personal 9.1 x86_64 S.u.S.E. Linux Personal 9.1 S.u.S.E. Linux Personal 10.1 Gentoo Linux Debian Linux 3.1 sparc Debian Linux 3.1 s/390 Debian Linux 3.1 ppc Debian Linux 3.1 mipsel Debian Linux 3.1 mips Debian Linux 3.1 m68k Debian Linux 3.1 ia-64 Debian Linux 3.1 ia-32 Debian Linux 3.1 hppa Debian Linux 3.1 arm Debian Linux 3.1 amd64 Debian Linux 3.1 alpha Debian Linux 3.1 AWStats AWStats 6.5 -1 |
| Not Vulnerable: | |
Discussion
AWStats Remote Arbitrary Command Execution Vulnerability
AWStats is prone to an arbitrary command-execution vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to execute arbitrary shell commands in the context of the webserver process. This may help attackers compromise the underlying system; other attacks are also possible.
AWStats is prone to an arbitrary command-execution vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.
An attacker can exploit this vulnerability to execute arbitrary shell commands in the context of the webserver process. This may help attackers compromise the underlying system; other attacks are also possible.
Exploit / POC
AWStats Remote Arbitrary Command Execution Vulnerability
Attackers can exploit this issue via a web client.
Attackers can exploit this issue via a web client.
Solution / Fix
AWStats Remote Arbitrary Command Execution Vulnerability
Solution:
Currently we are not aware of any official vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Please see the references for third-party vendor advisories and fixes.
Note: Although Debian advisory DSA 1058-1 was released to address this issue, Debian has reported that DSA 1058-1 does not in fact address the issue. Users should refer to DSA 1075-1 for fixes.
Solution:
Currently we are not aware of any official vendor-supplied patches for this issue. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected]:[email protected].
Please see the references for third-party vendor advisories and fixes.
Note: Although Debian advisory DSA 1058-1 was released to address this issue, Debian has reported that DSA 1058-1 does not in fact address the issue. Users should refer to DSA 1075-1 for fixes.
References
AWStats Remote Arbitrary Command Execution Vulnerability
References:
References:
- AWStats Homepage (AWStats)
- AWStats: Shell code injection via 'migrate' (Hendrik Weimer)