GLSA-200508-07 : AWStats: Arbitrary code execution using malicious Referrer information

medium Nessus Plugin ID 19440

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200508-07 (AWStats: Arbitrary code execution using malicious Referrer information)

When using a URLPlugin, AWStats fails to sanitize Referrer URL data before using them in a Perl eval() routine.
Impact :

A remote attacker can include arbitrary Referrer information in a HTTP request to a web server, therefore injecting tainted data in the log files. When AWStats is run on this log file, this can result in the execution of arbitrary Perl code with the rights of the user running AWStats.
Workaround :

Disable all URLPlugins in the AWStats configuration.

Solution

All AWStats users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=www-misc/awstats-6.5' Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

See Also

https://www.verisign.com/en_US/security-services/index.xhtml

https://security.gentoo.org/glsa/200508-07

Plugin Details

Severity: Medium

ID: 19440

File Name: gentoo_GLSA-200508-07.nasl

Version: 1.21

Type: local

Published: 8/18/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:awstats, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 8/16/2005

Reference Information

CVE: CVE-2005-1527

GLSA: 200508-07