This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Awstats First view 2005-01-18
Product Awstats Last view 2022-12-04
Version 1.0 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:awstats:awstats

Activity : Overall

Related : CVE

  Date Alert Description
6.1 2022-12-04 CVE-2022-46391

AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.

5.3 2020-12-12 CVE-2020-35176

In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.

9.8 2020-12-07 CVE-2020-29600

In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.

5.3 2018-04-20 CVE-2018-10245

A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters.

9.8 2018-01-03 CVE-2017-1000501

Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.

6.4 2010-12-02 CVE-2010-4369

Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.

7.5 2010-12-02 CVE-2010-4368

awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.

7.5 2010-12-02 CVE-2010-4367

awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.

5.8 2010-12-02 CVE-2009-5020

Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

4.3 2008-12-03 CVE-2008-5080

awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.

5 2006-07-21 CVE-2006-3682

awstats.pl in AWStats 6.5 build 1.857 and earlier allows remote attackers to obtain the installation path via the (1) year, (2) pluginmode or (3) month parameters.

2.6 2006-07-21 CVE-2006-3681

Multiple cross-site scripting (XSS) vulnerabilities in awstats.pl in AWStats 6.5 build 1.857 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) refererpagesfilter, (2) refererpagesfilterex, (3) urlfilterex, (4) urlfilter, (5) hostfilter, or (6) hostfilterex parameters, a different set of vectors than CVE-2006-1945.

2.6 2006-04-20 CVE-2006-1945

Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the config parameter. NOTE: this might be the same core issue as CVE-2005-2732.

5 2005-08-30 CVE-2005-2732

AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message.

5 2005-08-15 CVE-2005-1527

Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.

7.5 2005-01-18 CVE-2005-0116

AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.

CWE : Common Weakness Enumeration

%idName
33% (4) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
25% (3) CWE-94 Failure to Control Generation of Code ('Code Injection')
16% (2) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
16% (2) CWE-20 Improper Input Validation
8% (1) CWE-200 Information Exposure

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-18 Embedding Scripts in Nonscript Elements
CAPEC-19 Embedding Scripts within Scripts
CAPEC-32 Embedding Scripts in HTTP Query Strings
CAPEC-35 Leverage Executable Code in Nonexecutable Files
CAPEC-63 Simple Script Injection
CAPEC-85 Client Network Footprinting (using AJAX/XSS)
CAPEC-86 Embedding Script (XSS ) in HTTP Headers
CAPEC-91 XSS in IMG Tags
CAPEC-106 Cross Site Scripting through Log Files
CAPEC-198 Cross-Site Scripting in Error Pages
CAPEC-199 Cross-Site Scripting Using Alternate Syntax
CAPEC-209 Cross-Site Scripting Using MIME Type Mismatch
CAPEC-232 Exploitation of Privilege/Trust
CAPEC-243 Cross-Site Scripting in Attributes
CAPEC-244 Cross-Site Scripting via Encoded URI Schemes
CAPEC-245 Cross-Site Scripting Using Doubled Characters, e.g. %3C%3Cscript
CAPEC-246 Cross-Site Scripting Using Flash
CAPEC-247 Cross-Site Scripting with Masking through Invalid Characters in Identifiers

SAINT Exploits

Description Link
AWStats configdir parameter command execution More info here

Open Source Vulnerability Database (OSVDB)

id Description
69606 AWStats on Windows awstats.cgi configdir Parameter Crafted Share Config File ...
69605 AWStats Crafted LoadPlugin Directory Traversal Unspecified Issue
69591 AWStats awredir.pl Unspecified Arbitrary Site Redirect
47536 AWStats awstats.pl URL XSS
29604 AWStats awstats.pl Multiple Parameter XSS
25205 AWStats awstats.pl Multiple Variable Path Disclosure
24745 AWStats awstats.pl Multiple Parameter XSS
19145 AWStats awstats.pl config Variable Invalid File Path Disclosure
18696 AWStats ShowInfoURL Arbitrary Perl Code Execution
13002 AWStats awstats.pl configdir Parameter Arbitrary Command Execution

OpenVAS Exploits

id Description
2011-03-05 Name : FreeBSD Ports: awstats
File : nvt/freebsd_awstats4.nasl
2011-02-28 Name : Mandriva Update for awstats MDVSA-2011:033 (awstats)
File : nvt/gb_mandriva_MDVSA_2011_033.nasl
2011-01-31 Name : Ubuntu Update for awstats vulnerability USN-1047-1
File : nvt/gb_ubuntu_USN_1047_1.nasl
2011-01-25 Name : AWStats Unspecified 'LoadPlugin' Directory Traversal Vulnerability
File : nvt/gb_awstats_45210.nasl
2010-12-01 Name : Awstats Configuration File Remote Arbitrary Command Execution Vulnerability
File : nvt/gb_awstats_45123.nasl
2009-10-19 Name : Mandrake Security Advisory MDVSA-2009:266 (awstats)
File : nvt/mdksa_2009_266.nasl
2009-03-22 Name : AWStats 'awstats.pl' Multiple Path Disclosure Vulnerability
File : nvt/AWStats_cve_2006_3682.nasl
2009-02-16 Name : Fedora Update for awstats FEDORA-2008-10962
File : nvt/gb_fedora_2008_10962_awstats_fc9.nasl
2009-02-16 Name : Fedora Update for awstats FEDORA-2008-10938
File : nvt/gb_fedora_2008_10938_awstats_fc8.nasl
2009-02-16 Name : Fedora Update for awstats FEDORA-2008-10950
File : nvt/gb_fedora_2008_10950_awstats_fc10.nasl
2009-01-07 Name : FreeBSD Ports: awstats
File : nvt/freebsd_awstats3.nasl
2008-12-09 Name : AWStats awstats.pl XSS Vulnerability - Dec08
File : nvt/gb_awstats_xss_vuln.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200501-36 (awstats)
File : nvt/glsa_200501_36.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200508-07 (awstats)
File : nvt/glsa_200508_07.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200606-06 (awstats)
File : nvt/glsa_200606_06.nasl
2008-09-04 Name : FreeBSD Ports: awstats
File : nvt/freebsd_awstats1.nasl
2008-09-04 Name : FreeBSD Ports: awstats
File : nvt/freebsd_awstats0.nasl
2008-01-17 Name : Debian Security Advisory DSA 892-1 (awstats)
File : nvt/deb_892_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 682-1 (awstats)
File : nvt/deb_682_1.nasl

Snort® IPS/IDS

Date Description
2019-09-05 awstats.pl configdir command injection attempt
RuleID : 50882 - Type : SERVER-WEBAPP - Revision : 1
2019-09-05 awstats.pl configdir command injection attempt
RuleID : 50881 - Type : SERVER-WEBAPP - Revision : 1
2019-09-05 awstats.pl configdir command injection attempt
RuleID : 50880 - Type : SERVER-WEBAPP - Revision : 1
2016-04-19 AWStats awstats.cgi remote file include attempt
RuleID : 38253 - Type : SERVER-WEBAPP - Revision : 2
2016-04-19 AWStats awstats.cgi remote file include attempt
RuleID : 38252 - Type : SERVER-WEBAPP - Revision : 2
2014-01-10 awstats.pl configdir command injection attempt
RuleID : 3813 - Type : SERVER-WEBAPP - Revision : 13

Nessus® Vulnerability Scanner

id Description
2018-01-22 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-4092.nasl - Type: ACT_GATHER_INFO
2018-01-17 Name: The remote Fedora host is missing a security update.
File: fedora_2018-17ba1a2393.nasl - Type: ACT_GATHER_INFO
2018-01-15 Name: The remote Fedora host is missing a security update.
File: fedora_2018-7edfa0cfbf.nasl - Type: ACT_GATHER_INFO
2018-01-10 Name: The remote Debian host is missing a security update.
File: debian_DLA-1238.nasl - Type: ACT_GATHER_INFO
2018-01-09 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_4055aee5f4c611e795f2005056925db4.nasl - Type: ACT_GATHER_INFO
2011-02-10 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_ce6ce2f834ac11e0810300215c6a37bb.nasl - Type: ACT_GATHER_INFO
2011-01-25 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-1047-1.nasl - Type: ACT_GATHER_INFO
2009-04-23 Name: The remote Fedora host is missing a security update.
File: fedora_2008-10950.nasl - Type: ACT_GATHER_INFO
2009-04-23 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-686-1.nasl - Type: ACT_GATHER_INFO
2009-01-05 Name: The remote FreeBSD host is missing one or more security-related updates.
File: freebsd_pkg_27d78386d35f11ddb800001b77d09812.nasl - Type: ACT_GATHER_INFO
2008-12-09 Name: The remote Fedora host is missing a security update.
File: fedora_2008-10962.nasl - Type: ACT_GATHER_INFO
2008-12-09 Name: The remote Fedora host is missing a security update.
File: fedora_2008-10938.nasl - Type: ACT_GATHER_INFO
2007-11-10 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-360-1.nasl - Type: ACT_GATHER_INFO
2006-10-14 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-892.nasl - Type: ACT_GATHER_INFO
2006-06-08 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200606-06.nasl - Type: ACT_GATHER_INFO
2006-05-13 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_e86fbb5f0d0411dabc080001020eed82.nasl - Type: ACT_GATHER_INFO
2006-01-15 Name: The remote Ubuntu host is missing a security-related patch.
File: ubuntu_USN-167-1.nasl - Type: ACT_GATHER_INFO
2005-08-18 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200508-07.nasl - Type: ACT_GATHER_INFO
2005-08-10 Name: The remote web server contains a CGI script that allows execution of arbitrar...
File: awstats_referer_cmd_exec.nasl - Type: ACT_ATTACK
2005-07-13 Name: The remote FreeBSD host is missing a security-related update.
File: freebsd_pkg_0f5a2b4d694b11d9a9e70001020eed82.nasl - Type: ACT_GATHER_INFO
2005-02-16 Name: The remote Debian host is missing a security-related update.
File: debian_DSA-682.nasl - Type: ACT_GATHER_INFO
2005-02-14 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-200501-36.nasl - Type: ACT_GATHER_INFO
2005-01-18 Name: The remote web server contains a CGI script that allows execution of arbitrar...
File: awstats_configdir.nasl - Type: ACT_ATTACK