Skip to main content

AWStats Remote Code Execution and Directory Traversal Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 2 Dec 2010 4847 Views

RISK: Medium Risk

Two vulnerabilities have been identified in AWStats, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable web server.

1. An input validation error when specifying a configuration file directory on Windows, which could be exploited by attackers to inject and execute arbitrary code by loading a malicious configuration file from a SMB share.

2. An input validation error related to LoadPlugin, which could allow directory traversal attacks.


Impact

  • Remote Code Execution
  • Information Disclosure

System / Technologies affected

  • AWStats version 6.95 and prior

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Upgrade to AWStats version 7.0.


Vulnerability Identifier

  • No CVE information is available

Source


Related Link