ALT Linux sysadmins discussion
 help / color / mirror / Atom feed
* [Sysadmins] Fwd: [SA19969] AWStats "migrate" Shell Command Injection Vulnerability
@ 2006-05-05 13:23 Michael Shigorin
  0 siblings, 0 replies; only message in thread
From: Michael Shigorin @ 2006-05-05 13:23 UTC (permalink / raw)
  To: sysadmins

	Hi!
Напоминаю -- awstats лучше не использовать без правильного
.htaccess

----- Forwarded message from Secunia Security Advisories -----


TITLE:
AWStats "migrate" Shell Command Injection Vulnerability

SECUNIA ADVISORY ID:
SA19969

VERIFY ADVISORY:
http://secunia.com/advisories/19969/

CRITICAL:
Highly critical

IMPACT:
System access

WHERE:
>From remote

SOFTWARE:
AWStats 6.x
http://secunia.com/product/4490/

DESCRIPTION:
OS Reviews has reported a vulnerability in AWStats, which can be
exploited by malicious people to compromise a vulnerable system.

Input passed to the "migrate" parameter isn't properly sanitised
before being used in an "open()" call. This can be exploited to
inject and execute arbitrary shell commands via the "|" pipe
character.

Successful exploitation requires that "AllowToUpdateStatsFromBrowser"
is enabled (not default setting).
 
The vulnerability has been reported in versions 6.5 and 6.4. Prior
versions may also be affected.

SOLUTION:
The vulnerability has been fixed in version 6.6.

PROVIDED AND/OR DISCOVERED BY:
OS Reviews

ORIGINAL ADVISORY:
http://awstats.sourceforge.net/awstats_security_news.php
http://www.osreviews.net/reviews/comm/awstats

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

----- End forwarded message -----

-- 
 ---- WBR, Michael Shigorin <mike@altlinux.ru>
  ------ Linux.Kiev http://www.linux.kiev.ua/


^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2006-05-05 13:23 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-05-05 13:23 [Sysadmins] Fwd: [SA19969] AWStats "migrate" Shell Command Injection Vulnerability Michael Shigorin

ALT Linux sysadmins discussion

This inbox may be cloned and mirrored by anyone:

	git clone --mirror http://lore.altlinux.org/sysadmins/0 sysadmins/git/0.git

	# If you have public-inbox 1.1+ installed, you may
	# initialize and index your mirror using the following commands:
	public-inbox-init -V2 sysadmins sysadmins/ http://lore.altlinux.org/sysadmins \
		sysadmins@lists.altlinux.org sysadmins@lists.altlinux.ru sysadmins@lists.altlinux.com
	public-inbox-index sysadmins

Example config snippet for mirrors.
Newsgroup available over NNTP:
	nntp://lore.altlinux.org/org.altlinux.lists.sysadmins


AGPL code for this site: git clone https://public-inbox.org/public-inbox.git