{"vuid":"VU#272296","idnumber":"272296","name":"AWStats fails to properly filter user-supplied input","keywords":["AWStats","configdir","CGI","user-supplied input","arbitrary commands","Perl open"],"overview":"A lack of input validation in AWStats may allow a remote attacker to execute arbitrary commands.","clean_desc":"AWStats is a Perl CGI script that collects and graphically displays statistics from web, FTP, and mail servers. The configdir parameter, within the awstats.pl Perl script, is supplied user-controlled data and then passed as a parameter to the Perl routine open(). A lack of input validation on the configdir parameter may allow an attacker to compromise a vulnerable server. If an attacker supplies this parameter with arbitrary commands prefixed with the '|' character, those commands will be executed on the server. Please note that according to public reports, this vulnerability is being actively exploited.","impact":"If a remote attacker supplies AWStats with specially crafted input, that attacker may be able to execute arbitrary commands with the privileges of the attacked server process, in most cases user nobody.","resolution":"Upgrade This issue has been corrected in AWStats version 6.3. Users are strongly encouraged to upgrade to this version.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by iDEFENSE.","author":"This document was written by Jeff Gennari.","public":["http://awstats.sourceforge.net/docs/awstats_changelog.txt","http://www.idefense.com/application/poi/display?id=185&type=vulnerabilities","http://secunia.com/advisories/13893/"],"cveids":["CVE-2005-0116"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-01-20T20:01:38Z","publicdate":"2005-01-18T00:00:00Z","datefirstpublished":"2005-02-10T19:21:28Z","dateupdated":"2005-02-21T16:39:43Z","revision":44,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"11","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"15","cam_easeofexploitation":"10","cam_attackeraccessrequired":"14","cam_scorecurrent":"13.3875","cam_scorecurrentwidelyknown":"13.3875","cam_scorecurrentwidelyknownexploited":"16.93125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.3875,"vulnote":null}