ALT-PU-2018-2264-1
Closed vulnerabilities
Published: 2018-01-03
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2017-1000501
Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.
Severity: CRITICAL (9.8)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
References:
- http://www.awstats.org/
- http://www.awstats.org/
- https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651
- https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651
- https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899
- https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899
- [debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update
- [debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update
- GLSA-202007-37
- GLSA-202007-37
- DSA-4092
- DSA-4092
Published: 2018-04-20
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2018-10245
A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters.
Severity: MEDIUM (5.3)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
References: