Executive Summary

This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
NameCVE-2008-5080First vendor Publication2008-12-03
VendorCveLast vendor Modification2017-08-07

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N)
Cvss Base Score4.3Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityMedium
Cvss Expoit Score8.6AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores


awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5080

CAPEC : Common Attack Pattern Enumeration & Classification

CAPEC-18Embedding Scripts in Nonscript Elements
CAPEC-19Embedding Scripts within Scripts
CAPEC-32Embedding Scripts in HTTP Query Strings
CAPEC-63Simple Script Injection
CAPEC-85Client Network Footprinting (using AJAX/XSS)
CAPEC-86Embedding Script (XSS ) in HTTP Headers
CAPEC-106Cross Site Scripting through Log Files
CAPEC-198Cross-Site Scripting in Error Pages
CAPEC-199Cross-Site Scripting Using Alternate Syntax
CAPEC-209Cross-Site Scripting Using MIME Type Mismatch
CAPEC-232Exploitation of Privilege/Trust
CAPEC-243Cross-Site Scripting in Attributes
CAPEC-244Cross-Site Scripting via Encoded URI Schemes
CAPEC-245Cross-Site Scripting Using Doubled Characters, e.g. %3C%3Cscript
CAPEC-246Cross-Site Scripting Using Flash
CAPEC-247Cross-Site Scripting with Masking through Invalid Characters in Identifiers

CWE : Common Weakness Enumeration

100 %CWE-79Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25)

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:17861
Oval ID: oval:org.mitre.oval:def:17861
Title: USN-686-1 -- awstats vulnerability
Description: Morgan Todd discovered that AWStats did not correctly strip quotes from certain parameters, allowing for an XSS attack when running as a CGI.
Family: unix Class: patch
Reference(s): USN-686-1
Version: 7
Platform(s): Ubuntu 6.06
Ubuntu 7.10
Ubuntu 8.04
Ubuntu 8.10
Product(s): awstats
Definition Synopsis:

CPE : Common Platform Enumeration


OpenVAS Exploits

2009-10-19Name : Mandrake Security Advisory MDVSA-2009:266 (awstats)
File : nvt/mdksa_2009_266.nasl
2009-03-23Name : Ubuntu Update for awstats vulnerability USN-686-1
File : nvt/gb_ubuntu_USN_686_1.nasl
2009-02-16Name : Fedora Update for awstats FEDORA-2008-10938
File : nvt/gb_fedora_2008_10938_awstats_fc8.nasl
2009-02-16Name : Fedora Update for awstats FEDORA-2008-10950
File : nvt/gb_fedora_2008_10950_awstats_fc10.nasl
2009-02-16Name : Fedora Update for awstats FEDORA-2008-10962
File : nvt/gb_fedora_2008_10962_awstats_fc9.nasl
2009-01-07Name : FreeBSD Ports: awstats
File : nvt/freebsd_awstats3.nasl
2008-12-09Name : AWStats awstats.pl XSS Vulnerability - Dec08
File : nvt/gb_awstats_xss_vuln.nasl

Open Source Vulnerability Database (OSVDB)

47536AWStats awstats.pl URL XSS

Nessus® Vulnerability Scanner

2009-04-23Name : The remote Fedora host is missing a security update.
File : fedora_2008-10950.nasl - Type : ACT_GATHER_INFO
2009-04-23Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-686-1.nasl - Type : ACT_GATHER_INFO
2009-01-05Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_27d78386d35f11ddb800001b77d09812.nasl - Type : ACT_GATHER_INFO
2008-12-09Name : The remote Fedora host is missing a security update.
File : fedora_2008-10938.nasl - Type : ACT_GATHER_INFO
2008-12-09Name : The remote Fedora host is missing a security update.
File : fedora_2008-10962.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

CONFIRM https://bugzilla.redhat.com/show_bug.cgi?id=474396
MISC http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21
UBUNTU http://www.ubuntu.com/usn/usn-686-1
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/47116

Alert History

If you want to see full details history, please login or register.
2017-08-08 09:24:31
  • Multiple Updates
2016-04-26 18:01:45
  • Multiple Updates
2014-02-17 10:47:16
  • Multiple Updates
2013-05-11 00:30:45
  • Multiple Updates