{"vuid":"VU#870532","idnumber":"870532","name":"AWStats fails to properly handle \"\\\\\" when specifying a configuration file directory","keywords":["AWStats","\"\\\\\"","configuration file directory","Windows","Apache Tomcat","WebDAV","arbitrary command execution"],"overview":"AWStats fails to properly handle \"\\\\\" when specifying a configuration file directory. This could allow an attacker to specify an arbitrary configuration file located on an SMB share.","clean_desc":"From the AWStats project website: \"AWStats is a free powerful and featureful tool that generates advanced web, streaming, ftp or mail server statistics, graphically\". AWStats is vulnerable to remote command execution when installed on Apache Tomcat on Microsoft Windows operating systems. The AWStats application fails to properly handle \"\\\\\" when specifying a configuration file directory.","impact":"An attacker can instruct the web server to load a malicious configuration file located on a malicious SMB file share. The malicious configuration file can contain arbitrary commands to be run on the vulnerable remote server as the web service account.","resolution":"According to the vendor's changelog this vulnerability has been addressed in AWStats 7.0.","workarounds":"","sysaffected":"","thanks":"Thanks to StenoPlasma at ExploitDevelopment for reporting this vulnerability.","author":"This document was written by Michael Orlando.","public":["http://awstats.sourceforge.net/docs/awstats_changelog.txt","http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4367","http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4367","http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4368","http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4368"],"cveids":["CVE-2010-4367","CVE-2010-4368"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2010-11-03T15:27:58Z","publicdate":"2010-08-18T00:00:00Z","datefirstpublished":"2010-11-30T20:29:00Z","dateupdated":"2011-01-03T14:04:48Z","revision":17,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"5","cam_impact":"8","cam_easeofexploitation":"20","cam_attackeraccessrequired":"20","cam_scorecurrent":"5.4","cam_scorecurrentwidelyknown":"6.9","cam_scorecurrentwidelyknownexploited":"12.9","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":5.4,"vulnote":null}