First published: Tue May 30 2006(Updated: )
AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Awstats Awstats | =6.5 | |
Awstats Awstats | =6.5_1 | |
Awstats Awstats | =6.4_1-sarge1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.