First published: Sat Dec 30 2017(Updated: )
Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Awstats Awstats | <=7.6.0 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
debian/awstats | <=7.6+dfsg-1<=7.2+dfsg-1 | 7.6+dfsg-2 7.6+dfsg-1+deb9u1 7.2+dfsg-1+deb8u1 |
debian/awstats | 7.8-2+deb11u1 7.8-3+deb12u1 7.9-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-1000501 is a vulnerability in Awstats version 7.6 and earlier that allows for unauthenticated remote code execution through a path traversal flaw in the handling of the 'config' and 'migrate' parameters.
CVE-2017-1000501 has a severity score of 9.8, which is considered critical.
Awstats version 7.6 and earlier, as well as Debian Linux versions 7.0, 8.0, and 9.0, are affected by CVE-2017-1000501.
To fix CVE-2017-1000501, upgrade to Awstats version 7.9-1 or later and apply the necessary updates for Debian Linux.
You can find more information about CVE-2017-1000501 on the Awstats website and the GitHub repository for Awstats.