First published: Tue May 30 2006(Updated: )
AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
AWStats | =6.5 | |
AWStats | =6.5_1 | |
AWStats | =6.4_1-sarge1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-2644 is classified as a critical vulnerability due to its potential to allow remote authenticated users to execute arbitrary code.
To mitigate CVE-2006-2644, users should upgrade to a patched version of AWStats that removes the ability to exploit the configdir parameter.
CVE-2006-2644 affects users of AWStats versions 6.4_1-sarge1 and 6.5, specifically those with remote authenticated access.
CVE-2006-2644 can facilitate arbitrary code execution attacks, potentially leading to unauthorized access and control of the system.
While CVE-2006-2644 was disclosed in 2006, its relevance depends on the usage of the affected AWStats versions in current environments.