Summary
Detail | |||
---|---|---|---|
Vendor | Awstats | First view | 2005-01-18 |
Product | Awstats | Last view | 2022-12-04 |
Version | 1.0 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:awstats:awstats |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.1 | 2022-12-04 | CVE-2022-46391 | AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks. |
5.3 | 2020-12-12 | CVE-2020-35176 | In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600. |
9.8 | 2020-12-07 | CVE-2020-29600 | In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501. |
5.3 | 2018-04-20 | CVE-2018-10245 | A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters. |
9.8 | 2018-01-03 | CVE-2017-1000501 | Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution. |
6.4 | 2010-12-02 | CVE-2010-4369 | Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory. |
7.5 | 2010-12-02 | CVE-2010-4368 | awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname. |
7.5 | 2010-12-02 | CVE-2010-4367 | awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server. |
5.8 | 2010-12-02 | CVE-2009-5020 | Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. |
4.3 | 2008-12-03 | CVE-2008-5080 | awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714. |
5 | 2006-07-21 | CVE-2006-3682 | awstats.pl in AWStats 6.5 build 1.857 and earlier allows remote attackers to obtain the installation path via the (1) year, (2) pluginmode or (3) month parameters. |
2.6 | 2006-07-21 | CVE-2006-3681 | Multiple cross-site scripting (XSS) vulnerabilities in awstats.pl in AWStats 6.5 build 1.857 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) refererpagesfilter, (2) refererpagesfilterex, (3) urlfilterex, (4) urlfilter, (5) hostfilter, or (6) hostfilterex parameters, a different set of vectors than CVE-2006-1945. |
2.6 | 2006-04-20 | CVE-2006-1945 | Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the config parameter. NOTE: this might be the same core issue as CVE-2005-2732. |
5 | 2005-08-30 | CVE-2005-2732 | AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message. |
5 | 2005-08-15 | CVE-2005-1527 | Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call. |
7.5 | 2005-01-18 | CVE-2005-0116 | AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (4) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
25% (3) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
16% (2) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
16% (2) | CWE-20 | Improper Input Validation |
8% (1) | CWE-200 | Information Exposure |
CAPEC : Common Attack Pattern Enumeration & Classification
id | Name |
---|---|
CAPEC-18 | Embedding Scripts in Nonscript Elements |
CAPEC-19 | Embedding Scripts within Scripts |
CAPEC-32 | Embedding Scripts in HTTP Query Strings |
CAPEC-35 | Leverage Executable Code in Nonexecutable Files |
CAPEC-63 | Simple Script Injection |
CAPEC-85 | Client Network Footprinting (using AJAX/XSS) |
CAPEC-86 | Embedding Script (XSS ) in HTTP Headers |
CAPEC-91 | XSS in IMG Tags |
CAPEC-106 | Cross Site Scripting through Log Files |
CAPEC-198 | Cross-Site Scripting in Error Pages |
CAPEC-199 | Cross-Site Scripting Using Alternate Syntax |
CAPEC-209 | Cross-Site Scripting Using MIME Type Mismatch |
CAPEC-232 | Exploitation of Privilege/Trust |
CAPEC-243 | Cross-Site Scripting in Attributes |
CAPEC-244 | Cross-Site Scripting via Encoded URI Schemes |
CAPEC-245 | Cross-Site Scripting Using Doubled Characters, e.g. %3C%3Cscript |
CAPEC-246 | Cross-Site Scripting Using Flash |
CAPEC-247 | Cross-Site Scripting with Masking through Invalid Characters in Identifiers |
SAINT Exploits
Description | Link |
---|---|
AWStats configdir parameter command execution | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
69606 | AWStats on Windows awstats.cgi configdir Parameter Crafted Share Config File ... |
69605 | AWStats Crafted LoadPlugin Directory Traversal Unspecified Issue |
69591 | AWStats awredir.pl Unspecified Arbitrary Site Redirect |
47536 | AWStats awstats.pl URL XSS |
29604 | AWStats awstats.pl Multiple Parameter XSS |
25205 | AWStats awstats.pl Multiple Variable Path Disclosure |
24745 | AWStats awstats.pl Multiple Parameter XSS |
19145 | AWStats awstats.pl config Variable Invalid File Path Disclosure |
18696 | AWStats ShowInfoURL Arbitrary Perl Code Execution |
13002 | AWStats awstats.pl configdir Parameter Arbitrary Command Execution |
OpenVAS Exploits
id | Description |
---|---|
2011-03-05 | Name : FreeBSD Ports: awstats File : nvt/freebsd_awstats4.nasl |
2011-02-28 | Name : Mandriva Update for awstats MDVSA-2011:033 (awstats) File : nvt/gb_mandriva_MDVSA_2011_033.nasl |
2011-01-31 | Name : Ubuntu Update for awstats vulnerability USN-1047-1 File : nvt/gb_ubuntu_USN_1047_1.nasl |
2011-01-25 | Name : AWStats Unspecified 'LoadPlugin' Directory Traversal Vulnerability File : nvt/gb_awstats_45210.nasl |
2010-12-01 | Name : Awstats Configuration File Remote Arbitrary Command Execution Vulnerability File : nvt/gb_awstats_45123.nasl |
2009-10-19 | Name : Mandrake Security Advisory MDVSA-2009:266 (awstats) File : nvt/mdksa_2009_266.nasl |
2009-03-22 | Name : AWStats 'awstats.pl' Multiple Path Disclosure Vulnerability File : nvt/AWStats_cve_2006_3682.nasl |
2009-02-16 | Name : Fedora Update for awstats FEDORA-2008-10962 File : nvt/gb_fedora_2008_10962_awstats_fc9.nasl |
2009-02-16 | Name : Fedora Update for awstats FEDORA-2008-10938 File : nvt/gb_fedora_2008_10938_awstats_fc8.nasl |
2009-02-16 | Name : Fedora Update for awstats FEDORA-2008-10950 File : nvt/gb_fedora_2008_10950_awstats_fc10.nasl |
2009-01-07 | Name : FreeBSD Ports: awstats File : nvt/freebsd_awstats3.nasl |
2008-12-09 | Name : AWStats awstats.pl XSS Vulnerability - Dec08 File : nvt/gb_awstats_xss_vuln.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200501-36 (awstats) File : nvt/glsa_200501_36.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200508-07 (awstats) File : nvt/glsa_200508_07.nasl |
2008-09-24 | Name : Gentoo Security Advisory GLSA 200606-06 (awstats) File : nvt/glsa_200606_06.nasl |
2008-09-04 | Name : FreeBSD Ports: awstats File : nvt/freebsd_awstats1.nasl |
2008-09-04 | Name : FreeBSD Ports: awstats File : nvt/freebsd_awstats0.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 892-1 (awstats) File : nvt/deb_892_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 682-1 (awstats) File : nvt/deb_682_1.nasl |
Snort® IPS/IDS
Date | Description |
---|---|
2019-09-05 | awstats.pl configdir command injection attempt RuleID : 50882 - Type : SERVER-WEBAPP - Revision : 1 |
2019-09-05 | awstats.pl configdir command injection attempt RuleID : 50881 - Type : SERVER-WEBAPP - Revision : 1 |
2019-09-05 | awstats.pl configdir command injection attempt RuleID : 50880 - Type : SERVER-WEBAPP - Revision : 1 |
2016-04-19 | AWStats awstats.cgi remote file include attempt RuleID : 38253 - Type : SERVER-WEBAPP - Revision : 2 |
2016-04-19 | AWStats awstats.cgi remote file include attempt RuleID : 38252 - Type : SERVER-WEBAPP - Revision : 2 |
2014-01-10 | awstats.pl configdir command injection attempt RuleID : 3813 - Type : SERVER-WEBAPP - Revision : 13 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-01-22 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4092.nasl - Type: ACT_GATHER_INFO |
2018-01-17 | Name: The remote Fedora host is missing a security update. File: fedora_2018-17ba1a2393.nasl - Type: ACT_GATHER_INFO |
2018-01-15 | Name: The remote Fedora host is missing a security update. File: fedora_2018-7edfa0cfbf.nasl - Type: ACT_GATHER_INFO |
2018-01-10 | Name: The remote Debian host is missing a security update. File: debian_DLA-1238.nasl - Type: ACT_GATHER_INFO |
2018-01-09 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_4055aee5f4c611e795f2005056925db4.nasl - Type: ACT_GATHER_INFO |
2011-02-10 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_ce6ce2f834ac11e0810300215c6a37bb.nasl - Type: ACT_GATHER_INFO |
2011-01-25 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-1047-1.nasl - Type: ACT_GATHER_INFO |
2009-04-23 | Name: The remote Fedora host is missing a security update. File: fedora_2008-10950.nasl - Type: ACT_GATHER_INFO |
2009-04-23 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-686-1.nasl - Type: ACT_GATHER_INFO |
2009-01-05 | Name: The remote FreeBSD host is missing one or more security-related updates. File: freebsd_pkg_27d78386d35f11ddb800001b77d09812.nasl - Type: ACT_GATHER_INFO |
2008-12-09 | Name: The remote Fedora host is missing a security update. File: fedora_2008-10962.nasl - Type: ACT_GATHER_INFO |
2008-12-09 | Name: The remote Fedora host is missing a security update. File: fedora_2008-10938.nasl - Type: ACT_GATHER_INFO |
2007-11-10 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-360-1.nasl - Type: ACT_GATHER_INFO |
2006-10-14 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-892.nasl - Type: ACT_GATHER_INFO |
2006-06-08 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-200606-06.nasl - Type: ACT_GATHER_INFO |
2006-05-13 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_e86fbb5f0d0411dabc080001020eed82.nasl - Type: ACT_GATHER_INFO |
2006-01-15 | Name: The remote Ubuntu host is missing a security-related patch. File: ubuntu_USN-167-1.nasl - Type: ACT_GATHER_INFO |
2005-08-18 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-200508-07.nasl - Type: ACT_GATHER_INFO |
2005-08-10 | Name: The remote web server contains a CGI script that allows execution of arbitrar... File: awstats_referer_cmd_exec.nasl - Type: ACT_ATTACK |
2005-07-13 | Name: The remote FreeBSD host is missing a security-related update. File: freebsd_pkg_0f5a2b4d694b11d9a9e70001020eed82.nasl - Type: ACT_GATHER_INFO |
2005-02-16 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-682.nasl - Type: ACT_GATHER_INFO |
2005-02-14 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-200501-36.nasl - Type: ACT_GATHER_INFO |
2005-01-18 | Name: The remote web server contains a CGI script that allows execution of arbitrar... File: awstats_configdir.nasl - Type: ACT_ATTACK |