7.5
CVSSv2

CVE-2005-0116

Published: 18/01/2005 Updated: 05/09/2008
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 770
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

AWStats 6.1, and other versions prior to 6.3, allows remote malicious users to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.

Vulnerable Product Search on Vulmon Subscribe to Product

awstats awstats

Exploits

## # $Id: awstats_configdir_execrb 7970 2009-12-26 03:31:20Z hdm $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...
#!/usr/bin/perl #---GHC---------------------------------# #Remote command execution exploit # #Product: # #Advanced Web Statistics 60 - 62 # #URL:awstatssourceforgenet # #Greets & respects to our friends: # #1dtw0lf and all rstvoidru # #Special greets 2 d0G4 ...
## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf ...
/* AwStats exploit by Thunder, molnar_rcs@yahoocom This exploit makes use of the remote command execution bug discovered in AwStats ver 62 and below The bug resides in the awstatspl perl script The script does not sanitise correctly the user input for the `configdir` parameter If the users sends a command prefixed and postfixed with | , the ...