Описание
AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-2644
- https://usn.ubuntu.com/290-1
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910
- http://secunia.com/advisories/20164
- http://secunia.com/advisories/20283
- http://secunia.com/advisories/20502
- http://secunia.com/advisories/20710
- http://www.debian.org/security/2006/dsa-1075
- http://www.novell.com/linux/security/advisories/2006_33_awstats.html
- http://www.osreviews.net/reviews/comm/awstats
- http://www.securityfocus.com/bid/18327
- http://www.vupen.com/english/advisories/2006/1998
EPSS
CVE ID
Связанные уязвимости
AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
AWStats 6.5, and possibly other versions, allows remote authenticated ...
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
EPSS