AWStats Remote Code Execution and Directory Traversal Vulnerabilities
RISK: Medium Risk
Two vulnerabilities have been identified in AWStats, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable web server.
1. An input validation error when specifying a configuration file directory on Windows, which could be exploited by attackers to inject and execute arbitrary code by loading a malicious configuration file from a SMB share.
2. An input validation error related to LoadPlugin, which could allow directory traversal attacks.
Impact
- Remote Code Execution
- Information Disclosure
System / Technologies affected
- AWStats version 6.95 and prior
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Upgrade to AWStats version 7.0.
Vulnerability Identifier
- No CVE information is available
Source
Related Link
Share with