发布时间 :2006-05-30 06:02:00
修订时间 :2011-03-07 21:36:42

[原文]AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.

[CNNVD]Awstats 配置文件 远程任意命令执行漏洞(CNNVD-200605-512)

        AWStats 6.5及可能的其他版本可以使远程认证用户使用对awstats.pl的 configdir参数上传名称包含shell元字符的配置文件,然后再使用LogFile 指令访问该文件,从而执行任意代码。

- CVSS (基础分值)

CVSS分值: 4 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  VUPEN  ADV-2006-1998
(UNKNOWN)  BID  18327

- 漏洞信息

Awstats 配置文件 远程任意命令执行漏洞
中危 输入验证
2006-05-30 00:00:00 2006-05-30 00:00:00
        AWStats 6.5及可能的其他版本可以使远程认证用户使用对awstats.pl的 configdir参数上传名称包含shell元字符的配置文件,然后再使用LogFile 指令访问该文件,从而执行任意代码。

- 公告与补丁


- 漏洞信息

AWStats AWSTATS_ENABLE_CONFIG_DIR Path Subversion Privilege Escalation
Input Manipulation
Loss of Integrity Third-Party Solution

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-05-26 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Awstats Configuration File Remote Arbitrary Command Execution Vulnerability
Input Validation Error 18327
Yes No
2006-05-04 12:00:00 2006-06-23 03:45:00
Hendrik Weimer is credited with the discovery of this vulnerability.

- 受影响的程序版本

Ubuntu Ubuntu Linux 5.10 powerpc
Ubuntu Ubuntu Linux 5.10 i386
Ubuntu Ubuntu Linux 5.10 amd64
Ubuntu Ubuntu Linux 5.0 4 powerpc
Ubuntu Ubuntu Linux 5.0 4 i386
Ubuntu Ubuntu Linux 5.0 4 amd64
Ubuntu Ubuntu Linux 6.06 LTS powerpc
Ubuntu Ubuntu Linux 6.06 LTS i386
Ubuntu Ubuntu Linux 6.06 LTS amd64
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 10.1
Gentoo Linux
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
AWStats AWStats 6.4
AWStats AWStats 6.3
AWStats AWStats 6.2
AWStats AWStats 6.1
AWStats AWStats 6.0
AWStats AWStats 6.5.0 build 1.857
AWStats AWStats 6.5 -1

- 漏洞讨论

Awstats is prone to an arbitrary command-execution vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

An attacker can exploit this vulnerability to execute arbitrary shell commands in the context of the webserver process. This may help attackers compromise the underlying system; other attacks are also possible.

- 漏洞利用

This issue can be exploited through a web client.

- 解决方案

Currently we are not aware of any official vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at:

Please see the references for third-party vendor advisories and fixes.

AWStats AWStats 6.1

AWStats AWStats 6.3

AWStats AWStats 6.4

- 相关参考