Vulnerability Name: | CVE-2005-0363 (CCN-18910) | ||||||||
Assigned: | 2005-01-15 | ||||||||
Published: | 2005-01-15 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | awstats.pl in AWStats 4.0 and 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the config parameter. | ||||||||
CVSS v3 Severity: | 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: AWStats Download Web page AWStats Source: CONFIRM Type: Vendor Advisory http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488 Source: MITRE Type: CNA CVE-2005-0363 Source: CCN Type: SECTRACK ID: 1012906 AWStats Input Validation Flaws Let Users Execute Arbitrary Commands Source: CCN Type: SECTRACK ID: 1013008 (Gentoo Issues Fix) AWStats Input Validation Flaws Let Users Execute Arbitrary Commands Source: DEBIAN Type: Patch, Vendor Advisory DSA-682 Source: DEBIAN Type: DSA-682 awstats -- missing input sanitizing Source: CCN Type: GLSA-200501-36 AWStats: Remote code execution Source: CCN Type: US-CERT VU#259785 AWStats fails to validate input supplied to pluginmode parameter Source: CCN Type: BID-12543 AWStats Plugin Multiple Remote Command Execution Vulnerabilities Source: XF Type: UNKNOWN awstats-command-execution(18910) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |