GLSA-200501-36 : AWStats: Remote code execution

high Nessus Plugin ID 16427

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200501-36 (AWStats: Remote code execution)

When 'awstats.pl' is run as a CGI script, it fails to validate specific inputs which are used in a Perl open() function call. Furthermore, a user could read log file content even when plugin rawlog was not enabled.
Impact :

A remote attacker could supply AWStats malicious input, potentially allowing the execution of arbitrary code with the rights of the web server. He could also access raw log contents.
Workaround :

Making sure that AWStats does not run as a CGI script will avoid the issue, but we recommend that users upgrade to the latest version, which fixes these bugs.

Solution

All AWStats users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=www-misc/awstats-6.3-r2' Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

See Also

https://awstats.sourceforge.io/docs/awstats_changelog.txt

http://www.nessus.org/u?020e4b8e

https://security.gentoo.org/glsa/200501-36

Plugin Details

Severity: High

ID: 16427

File Name: gentoo_GLSA-200501-36.nasl

Version: 1.22

Type: local

Published: 2/14/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.0

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:awstats, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/25/2005

Exploitable With

Metasploit (AWStats configdir Remote Command Execution)

Reference Information

CVE: CVE-2005-0116, CVE-2005-0362, CVE-2005-0363

CWE: 20

GLSA: 200501-36