vendor:
AWStats
by:
1dt.w0lf
9.3
CVSS
HIGH
Command Execution
78
CWE
Product Name: AWStats
Affected Version From: AWStats < 6.4
Affected Version To: AWStats < 6.4
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows, Linux, Mac
2005
AWStats < 6.4 command execution exploit
This exploit allows an attacker to execute arbitrary commands on a vulnerable system. The vulnerability is based on the AWStats < 6.4 application, which is vulnerable to a command injection attack when a URLPlugin is enabled. The attacker can inject malicious code into the 'refererpagesfilterex' parameter of the 'refererpages' output, which is then executed by the system.
Mitigation:
Disable URLPlugins and ensure that the 'refererpagesfilterex' parameter is properly sanitized.