9.3
CVSSv2

CVE-2008-3922

Published: 04/09/2008 Updated: 11/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 955
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

awstatstotals.php in AWStats Totals 1.0 up to and including 1.14 allows remote malicious users to execute arbitrary code via PHP sequences in the sort parameter, which is used by the multisort function when dynamically creating an anonymous PHP function.

Vulnerable Product Search on Vulmon Subscribe to Product

telartis bv awstats totals 1.1

telartis bv awstats totals 1.11

telartis bv awstats totals 1.13

telartis bv awstats totals 1.14

telartis bv awstats totals 1.0

Exploits

## # $Id: awstatstotals_multisortrb 12715 2011-05-25 10:45:36Z patrickw $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/ ...
<?php /* * Remote Execution Exploit for AWStats Totals vulnerability (Interactive Shell) Version 2 * * Updated 05/09/08: The exploit now works with magic quotes on or off * * Author: Ricardo Almeida * email: ricardojba[at]aeiou[DoT]pt * * Greetz * The hacker webzine authored by Ronald van den Heetkamp for his code * * Credits: Vu ...

Nmap Scripts

http-awstatstotals-exec

Exploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14 and possibly other products based on it (CVE: 2008-3922).

nmap -sV --script http-awstatstotals-exec.nse --script-args 'http-awstatstotals-exec.cmd="uname -a", http-awstatstotals-exec.uri=/awstats/index.php' <target>
nmap -sV --script http-awstatstotals-exec.nse <target>

PORT STATE SERVICE REASON 80/tcp open http syn-ack | http-awstatstotals-exec.nse: |_Output for 'uname -a':Linux 2.4.19 #1 Son Apr 14 09:53:28 CEST 2002 i686 GNU/Linux