AWStats Referrer Header Arbitrary Command Execution

medium Nessus Plugin ID 19415

Synopsis

The remote web server contains a CGI script that allows execution of arbitrary commands.

Description

The remote host is running AWStats, an open source web analytics tool used for analyzing data from internet services such as web, streaming, media, mail and FTP servers.

The version of AWStats installed on the remote host collects data about the web referrers and uses them without proper sanitation in an eval() statement. Using specially crafted referrer data, an attacker can cause arbitrary Perl code to be executed on the remote host within the context of the affected application once the stats page has been regenerated and when a user visits the referer statistics page.

Note that successful exploitation requires that at least one URLPlugin is enabled.

Solution

Upgrade to AWStats 6.5 or later.

See Also

http://www.nessus.org/u?e529878e

https://seclists.org/fulldisclosure/2005/Aug/237

https://seclists.org/fulldisclosure/2005/Aug/369

Plugin Details

Severity: Medium

ID: 19415

File Name: awstats_referer_cmd_exec.nasl

Version: 1.28

Type: remote

Family: CGI abuses

Published: 8/10/2005

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.1

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:laurent_destailleur:awstats

Required KB Items: www/AWStats

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 8/9/2005

Reference Information

CVE: CVE-2005-1527

BID: 14525