AWStats Remote Code Execution and Directory Traversal Vulnerabilities


Description   Two vulnerabilities have been identified in AWStats, which could be exploited by remote attackers to gain knowledge of sensitive information or compromise a vulnerable web server.
The first issue is caused by an input validation error when specifying a configuration file directory on Windows, which could be exploited by attackers to inject and execute arbitrary code by loading a malicious configuration file from a SMB share.
The second vulnerability is caused by an input validation error related to LoadPlugin, which could allow directory traversal attacks.
     
Vulnerable Products   Vulnerable Software:
AWStats version 6.95 and prior
     
Solution   Upgrade to AWStats version 7.0.
     
CVE   CVE-2010-4369
CVE-2010-4368
CVE-2010-4367
     
References   http://awstats.sourceforge.net/docs/awstats_changelog.txt
http://www.kb.cert.org/vuls/id/870532
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2010-12-01 

 Target Type 
Server 

 Possible exploit 
Local & Remote