AWStats < 6.6 migrate Variable Command Execution

Medium Nessus Network Monitor Plugin ID 3536


The remote host is vulnerable to an arbitrary 'command insertion' flaw.


The remote host is running AWStats, a CGI log analyzer. There are various content-parsing flaws in the remote version of this software that would allow an attacker to execute code on the remote host. An attacker exploiting this flaw would only need to be able to generate HTTP requests to the CGI script. A successful attack would allow the attacker to run system commands with the privileges of the CGI script.


Upgrade to version 6.6 or higher.

See Also

Plugin Details

Severity: Medium

ID: 3536

File Name: 3536.prm

Family: CGI

Published: 2004/08/18

Modified: 2016/01/21

Dependencies: 1442

Risk Information

Risk Factor: Medium


Base Score: 5.1

Temporal Score: 4.2

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND


Base Score: 5.6

Temporal Score: 5.2


Temporal Vector: CVSS3#E:F/RL:O/RC:X

Exploitable With

Metasploit (AWStats migrate Remote Command Execution)

Reference Information

CVE: CVE-2006-2237

BID: 17844