4
CVSSv2

CVE-2006-2644

Published: 30/05/2006 Updated: 03/10/2018
CVSS v2 Base Score: 4 | Impact Score: 2.9 | Exploitability Score: 8
VMScore: 356
Vector: AV:N/AC:L/Au:S/C:N/I:P/A:N

Vulnerability Summary

AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.

Vulnerable Product Search on Vulmon Subscribe to Product

awstats awstats 6.5_1

awstats awstats 6.4_1

awstats awstats 6.5

Vendor Advisories

Hendrik Weimer discovered a privilege escalation vulnerability in awstats By supplying the ‘configdir’ CGI parameter and setting it to an attacker-controlled directory (such as an FTP account, /tmp, or similar), an attacker could execute arbitrary shell commands with the privileges of the web server (user ‘www-data’) ...
Hendrik Weimer discovered that awstats can execute arbitrary commands under the user id the web-server runs when users are allowed to supply arbitrary configuration files Even though, this bug was referenced in DSA 1058 accidentally, it was not fixed yet The new default behaviour is not to accept arbitrary configuration directories from the user ...