5.1
CVSSv2

CVE-2006-2237

Published: 08/05/2006 Updated: 03/10/2018
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 525
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote malicious users to execute arbitrary code via shell metacharacters in the migrate parameter.

Vulnerable Product Search on Vulmon Subscribe to Product

awstats awstats 6.4

awstats awstats 6.5

Vendor Advisories

AWStats did not properly sanitize the ‘migrate’ CGI parameter If the update of the stats via web front-end is allowed, a remote attacker could execute arbitrary commands on the server with the privileges of the AWStats server ...
Hendrik Weimer discovered that specially crafted web requests can cause awstats, a powerful and featureful web server log analyzer, to execute arbitrary commands The old stable distribution (woody) is not affected by this problem For the stable distribution (sarge) this problem has been fixed in version 64-1sarge2 For the unstable distribution ...
Debian Bug report logs - #365909 AWStats: Shell code injection via 'migrate' Package: awstats; Maintainer for awstats is Debian QA Group <packages@qadebianorg>; Source for awstats is src:awstats (PTS, buildd, popcon) Reported by: Hendrik Weimer <hendrik@enyode> Date: Wed, 3 May 2006 17:33:32 UTC Severity: import ...
Debian Bug report logs - #365910 AWStats: Malicious config file shell code injection Package: awstats; Maintainer for awstats is Debian QA Group <packages@qadebianorg>; Source for awstats is src:awstats (PTS, buildd, popcon) Reported by: Hendrik Weimer <hendrik@enyode> Date: Wed, 3 May 2006 17:33:37 UTC Severity ...
Debian Bug report logs - #364443 [CVE-2006-1945]: Cross-site scripting allows script injection in awstats 65 and earlier Package: awstats; Maintainer for awstats is Debian QA Group <packages@qadebianorg>; Source for awstats is src:awstats (PTS, buildd, popcon) Reported by: Micah Anderson <micah@debianorg> Date: S ...

Exploits

## # $Id$ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf ...
#!/usr/bin/env python # secuniacom/advisories/19969/ # by redsand@blacksecurityorg # May 5, 2006 - HAPPY CINCO DE MAYO # HAPPY BIRTHDAY DAD # private plz # # redsand@jinxy ~/ $ nc -l -p 31337 -v # listening on [any] 31337 # connect to [6599197147] from blacksecurityorg [6599197147] 53377 # id # uid=81(apache) gid=81(apache) g ...
## # $Id: awstats_migrate_execrb 9671 2010-07-03 06:21:31Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...