Vulnerabilites related to awstats - awstats
Vulnerability from fkie_nvd
Published
2010-12-02 16:22
Modified
2025-04-11 00:51
Severity ?
Summary
awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7115E25-7D97-4CEE-A1E1-A2E5029EAD92",
              "versionEndIncluding": "6.95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "429BAD9D-2EE5-45F9-AE64-81297CB021E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA8E3D3-78F9-47E4-926A-014E277149BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26C7A8E-253B-4A5D-AA43-76272DBCE5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "257E78AE-01A0-47D3-89DC-034707061DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9472B294-86D2-4EA0-A5EC-528546582B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1FA8C0-64DF-4B52-A034-400678D086E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39BF58B2-6895-4131-8620-8DFEE7BE4A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C941C8-7433-4518-B25E-987380FBD615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC7CE6C-5542-438C-9992-47FE411F0D70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:sarge1:*:*:*:*:*:*",
              "matchCriteriaId": "BE110FB0-77EF-40AB-9FD7-6D1410AA1296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C9F6F9-04C8-4169-B779-3195E31B8616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1.857:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB81DA1-ACDD-43DC-BA06-E10DE98BE698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8DE50-16FC-4CC5-A0CE-9C7C4858285A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF1AC45-C46E-4A60-B1D9-B972E838E5AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server."
    },
    {
      "lang": "es",
      "value": "awstats.cgi en AWStats anterior a v7.0 en Windows  acepta un par\u00e1metro configdir en la URL, permitiendo a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un fichero de configuraci\u00f3n manipulado situado en (1) un servidor WebDAV o (2) en un servidor NFS."
    }
  ],
  "id": "CVE-2010-4367",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-12-02T16:22:21.847",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-30 10:02
Modified
2025-04-03 01:03
Severity ?
Summary
AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910
cve@mitre.orghttp://secunia.com/advisories/20164Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20283Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20502
cve@mitre.orghttp://secunia.com/advisories/20710
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1075Patch
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_33_awstats.html
cve@mitre.orghttp://www.osreviews.net/reviews/comm/awstatsPatch
cve@mitre.orghttp://www.securityfocus.com/bid/18327
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1998
cve@mitre.orghttps://usn.ubuntu.com/290-1/
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20164Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20283Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20502
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20710
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1075Patch
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_33_awstats.html
af854a3a-2127-422b-91ae-364da2661108http://www.osreviews.net/reviews/comm/awstatsPatch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18327
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1998
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/290-1/
Impacted products
Vendor Product Version
awstats awstats 6.4_1
awstats awstats 6.5
awstats awstats 6.5_1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:sarge1:*:*:*:*:*:*",
              "matchCriteriaId": "BE110FB0-77EF-40AB-9FD7-6D1410AA1296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C9F6F9-04C8-4169-B779-3195E31B8616",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive."
    }
  ],
  "id": "CVE-2006-2644",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-30T10:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20164"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20283"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20502"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20710"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2006/dsa-1075"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osreviews.net/reviews/comm/awstats"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/18327"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1998"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/290-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20283"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20502"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20710"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.debian.org/security/2006/dsa-1075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osreviews.net/reviews/comm/awstats"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/290-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
awstats.pl in AWStats 4.0 and 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the config parameter.
Impacted products
Vendor Product Version
awstats awstats 4.0
awstats awstats 6.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.pl in AWStats 4.0 and 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the config parameter."
    }
  ],
  "id": "CVE-2005-0363",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "security@debian.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2005/dsa-682"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2005/dsa-682"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-30 11:45
Modified
2025-04-03 01:03
Severity ?
Summary
AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message.
Impacted products
Vendor Product Version
awstats awstats *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B26DE8-DB65-4D9D-8C74-4BCDB83B0A76",
              "versionEndIncluding": "6.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message."
    }
  ],
  "id": "CVE-2005-2732",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-30T11:45:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112510261425888\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112510261425888\u0026w=2"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-07-21 14:03
Modified
2025-04-03 01:03
Severity ?
Summary
awstats.pl in AWStats 6.5 build 1.857 and earlier allows remote attackers to obtain the installation path via the (1) year, (2) pluginmode or (3) month parameters.
Impacted products
Vendor Product Version
awstats awstats *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE4E972-EFD0-4226-8917-8C71CCC551AF",
              "versionEndIncluding": "6.5_1.857",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.pl in AWStats 6.5 build 1.857 and earlier allows remote attackers to obtain the installation path via the (1) year, (2) pluginmode or (3) month parameters."
    },
    {
      "lang": "es",
      "value": "awstats.pl en AWStats 6.5 build 1.857 y anteriores permite a atacantes remotos obtener la ruta de instalaci\u00f3n a trav\u00e9s de los par\u00e1metros (1) year, (2) pluginmode o (3) month."
    }
  ],
  "id": "CVE-2006-3682",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-07-21T14:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19725"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-360-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1421"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25880"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-360-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25880"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-08 23:02
Modified
2025-04-03 01:03
Severity ?
Summary
The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter.
References
cve@mitre.orghttp://awstats.sourceforge.net/awstats_security_news.php
cve@mitre.orghttp://secunia.com/advisories/19969Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/20170
cve@mitre.orghttp://secunia.com/advisories/20186
cve@mitre.orghttp://secunia.com/advisories/20496
cve@mitre.orghttp://secunia.com/advisories/20710
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200606-06.xml
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1058
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2006_33_awstats.html
cve@mitre.orghttp://www.osreviews.net/reviews/comm/awstats
cve@mitre.orghttp://www.osvdb.org/25284Patch
cve@mitre.orghttp://www.securityfocus.com/bid/17844
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/1678
cve@mitre.orghttp://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26287
cve@mitre.orghttps://usn.ubuntu.com/285-1/
af854a3a-2127-422b-91ae-364da2661108http://awstats.sourceforge.net/awstats_security_news.php
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19969Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20170
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20186
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20496
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20710
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200606-06.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1058
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_33_awstats.html
af854a3a-2127-422b-91ae-364da2661108http://www.osreviews.net/reviews/comm/awstats
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/25284Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17844
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1678
af854a3a-2127-422b-91ae-364da2661108http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26287
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/285-1/
Impacted products
Vendor Product Version
awstats awstats 6.4
awstats awstats 6.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter."
    }
  ],
  "id": "CVE-2006-2237",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-08T23:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/awstats_security_news.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19969"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20170"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20186"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20496"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20710"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1058"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osreviews.net/reviews/comm/awstats"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/25284"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17844"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1678"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26287"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/285-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/awstats_security_news.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19969"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20186"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20496"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20710"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1058"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osreviews.net/reviews/comm/awstats"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.osvdb.org/25284"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17844"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1678"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26287"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/285-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-12-02 16:22
Modified
2025-04-11 00:51
Severity ?
Summary
Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "966ED168-9738-44FA-85B1-B0183C2AEEFE",
              "versionEndIncluding": "6.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "429BAD9D-2EE5-45F9-AE64-81297CB021E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA8E3D3-78F9-47E4-926A-014E277149BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26C7A8E-253B-4A5D-AA43-76272DBCE5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "257E78AE-01A0-47D3-89DC-034707061DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9472B294-86D2-4EA0-A5EC-528546582B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1FA8C0-64DF-4B52-A034-400678D086E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39BF58B2-6895-4131-8620-8DFEE7BE4A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C941C8-7433-4518-B25E-987380FBD615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8DE50-16FC-4CC5-A0CE-9C7C4858285A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de redirecci\u00f3n abierta en awredir.pl en AWStats anterior a v6.95 permite a atacantes remotos redireccionar a usuarios a sitios web de su elecci\u00f3n y llevar a cabo ataques de phishing a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2009-5020",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-12-02T16:22:20.613",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-04-20 22:02
Modified
2025-04-03 01:03
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the config parameter. NOTE: this might be the same core issue as CVE-2005-2732.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE4E972-EFD0-4226-8917-8C71CCC551AF",
              "versionEndIncluding": "6.5_1.857",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the config parameter.  NOTE: this might be the same core issue as CVE-2005-2732."
    }
  ],
  "id": "CVE-2006-1945",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2006-04-20T22:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://pridels0.blogspot.com/2006/04/awstats-65-vuln.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20496"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/17621"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://pridels0.blogspot.com/2006/04/awstats-65-vuln.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20496"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17621"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-08-15 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
References
cve@mitre.orghttp://secunia.com/advisories/16412Broken Link, Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/17463Broken Link
cve@mitre.orghttp://securitytracker.com/id?1014636Broken Link, Patch, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.debian.org/security/2005/dsa-892Mailing List, Third Party Advisory
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=falseBroken Link
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2005_19_sr.htmlBroken Link
cve@mitre.orghttp://www.osvdb.org/18696Broken Link, Patch
cve@mitre.orghttp://www.securiteam.com/unixfocus/5DP0J00GKE.htmlBroken Link, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/14525Broken Link, Third Party Advisory, VDB Entry
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/21769Third Party Advisory, VDB Entry
cve@mitre.orghttps://usn.ubuntu.com/167-1/Broken Link
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/16412Broken Link, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/17463Broken Link
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1014636Broken Link, Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2005/dsa-892Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=falseBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2005_19_sr.htmlBroken Link
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/18696Broken Link, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securiteam.com/unixfocus/5DP0J00GKE.htmlBroken Link, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/14525Broken Link, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/21769Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/167-1/Broken Link
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "72B26DE8-DB65-4D9D-8C74-4BCDB83B0A76",
              "versionEndIncluding": "6.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "42E47538-08EE-4DC1-AC17-883C44CF77BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAE037F-111C-4A76-8FFE-716B74D65EF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call."
    }
  ],
  "id": "CVE-2005-1527",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-08-15T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16412"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/17463"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1014636"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2005/dsa-892"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=290\u0026type=vulnerabilities\u0026flashstatus=false"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://www.osvdb.org/18696"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://www.securiteam.com/unixfocus/5DP0J00GKE.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/14525"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://usn.ubuntu.com/167-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16412"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://secunia.com/advisories/17463"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://securitytracker.com/id?1014636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2005/dsa-892"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=290\u0026type=vulnerabilities\u0026flashstatus=false"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch"
      ],
      "url": "http://www.osvdb.org/18696"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Vendor Advisory"
      ],
      "url": "http://www.securiteam.com/unixfocus/5DP0J00GKE.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/14525"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://usn.ubuntu.com/167-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to execute portions of Perl code via the PluginMode parameter.
Impacted products
Vendor Product Version
awstats awstats 6.3
awstats awstats 6.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to execute portions of Perl code via the PluginMode parameter."
    }
  ],
  "id": "CVE-2005-0436",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14299"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/13832"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390368"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19336"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14299"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/13832"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19336"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-08-19 19:41
Modified
2025-04-09 00:30
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.8 allows remote attackers to inject arbitrary web script or HTML via the query_string, a different vulnerability than CVE-2006-3681 and CVE-2006-1945.
References
cve@mitre.orghttp://awstats.sourceforge.net/docs/awstats_changelog.txt
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432
cve@mitre.orghttp://secunia.com/advisories/31519Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/31759
cve@mitre.orghttp://secunia.com/advisories/32939
cve@mitre.orghttp://secunia.com/advisories/33002
cve@mitre.orghttp://sourceforge.net/tracker/index.php?func=detail&aid=2001151&group_id=13764&atid=113764
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1679
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:203
cve@mitre.orghttp://www.securityfocus.com/bid/30730
cve@mitre.orghttp://www.securitytracker.com/id?1020704
cve@mitre.orghttp://www.ubuntu.com/usn/usn-686-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2399
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/44504
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html
af854a3a-2127-422b-91ae-364da2661108http://awstats.sourceforge.net/docs/awstats_changelog.txt
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31519Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31759
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32939
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33002
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/tracker/index.php?func=detail&aid=2001151&group_id=13764&atid=113764
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1679
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:203
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/30730
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020704
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/usn-686-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2399
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/44504
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html
Impacted products
Vendor Product Version
awstats awstats 6.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8DE50-16FC-4CC5-A0CE-9C7C4858285A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.8 allows remote attackers to inject arbitrary web script or HTML via the query_string, a different vulnerability than CVE-2006-3681 and CVE-2006-1945."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de Secuencias de comandos en sitios cruzados(XSS) en AWStats 6.8, permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrariamente a trav\u00e9s de query_string, una vulnerabilidad diferente a CVE-2006-3681 y a CVE-2006-1945."
    }
  ],
  "id": "CVE-2008-3714",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-08-19T19:41:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31519"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/31759"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32939"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2001151\u0026group_id=13764\u0026atid=113764"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1679"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:203"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/30730"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020704"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-686-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/2399"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44504"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/31759"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32939"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2001151\u0026group_id=13764\u0026atid=113764"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1679"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:203"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/30730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020704"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-686-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/2399"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44504"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-12-02 16:22
Modified
2025-04-11 00:51
Severity ?
Summary
awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7115E25-7D97-4CEE-A1E1-A2E5029EAD92",
              "versionEndIncluding": "6.95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "429BAD9D-2EE5-45F9-AE64-81297CB021E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA8E3D3-78F9-47E4-926A-014E277149BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26C7A8E-253B-4A5D-AA43-76272DBCE5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "257E78AE-01A0-47D3-89DC-034707061DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9472B294-86D2-4EA0-A5EC-528546582B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1FA8C0-64DF-4B52-A034-400678D086E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39BF58B2-6895-4131-8620-8DFEE7BE4A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C941C8-7433-4518-B25E-987380FBD615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC7CE6C-5542-438C-9992-47FE411F0D70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:sarge1:*:*:*:*:*:*",
              "matchCriteriaId": "BE110FB0-77EF-40AB-9FD7-6D1410AA1296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C9F6F9-04C8-4169-B779-3195E31B8616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1.857:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB81DA1-ACDD-43DC-BA06-E10DE98BE698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8DE50-16FC-4CC5-A0CE-9C7C4858285A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF1AC45-C46E-4A60-B1D9-B972E838E5AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname."
    },
    {
      "lang": "es",
      "value": "awstats.cgi en AWStats anterior a v7.0 en Windows  acepta un par\u00e1metro configdir en la URL, permitiendo a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un fichero de configuraci\u00f3n manipulado situado en una ruta de acceso compartido UNC."
    }
  ],
  "id": "CVE-2010-4368",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-12-02T16:22:21.880",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/870532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/870532"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-12-12 00:15
Modified
2024-11-21 05:26
Summary
In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "543AC33E-6B91-491D-B885-CF67915A7726",
              "versionEndIncluding": "7.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600."
    },
    {
      "lang": "es",
      "value": "En AWStats versiones hasta 7.8, cgi-bin/awstats.pl?config= acepta un nombre de ruta absoluto parcial (omitiendo el inicio /etc), aunque solo estaba destinado a leer un archivo en el formato /etc/awstats/awstats.conf.\u0026#xa0;NOTA: este problema se presenta debido a una correcci\u00f3n incompleta para CVE-2017-1000501 y CVE-2020-29600"
    }
  ],
  "id": "CVE-2020-35176",
  "lastModified": "2024-11-21T05:26:54.303",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-12-12T00:15:12.140",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/issues/195"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/issues/195"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-12-03 18:30
Modified
2025-04-09 00:30
Severity ?
Summary
awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB95D838-4A64-4FEE-82BB-E3788A87215F",
              "versionEndIncluding": "6.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter.  NOTE: this issue exists because of an incomplete fix for CVE-2008-3714."
    },
    {
      "lang": "es",
      "value": "awstats.pl en AWStats 6.8 y versiones anteriores no borrar apropiadamente el car\u00e1cter de comilla simple, el cual permite a los atacantes remotos realizas un ataque de secuencias de comandos en sitios cruzados (XSS) a trav\u00e9s del par\u00e1metro query_string. NOTA: Este asunto existe por una incompleta soluci\u00f3n para CVE-2008-3714."
    }
  ],
  "id": "CVE-2008-5080",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-12-03T18:30:00.430",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/33002"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-686-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-686-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-20 17:29
Modified
2024-11-21 03:41
Summary
A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters.
Impacted products
Vendor Product Version
awstats awstats *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E6C81FF-D807-4161-B7C3-06E66A2EDBE6",
              "versionEndIncluding": "7.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de divulgaci\u00f3n de ruta completa en AWStats, hasta la versi\u00f3n 7.6, permite que atacantes remotos sepan d\u00f3nde est\u00e1 alojado el archivo de configuraci\u00f3n, lo que les permite obtener la ruta completa del servidor. Este problema es similar a CVE-2006-3682. El ataque puede, por ejemplo, emplear los par\u00e1metros framename y update en awstats.pl."
    }
  ],
  "id": "CVE-2018-10245",
  "lastModified": "2024-11-21T03:41:06.093",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-20T17:29:00.243",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter.
Impacted products
Vendor Product Version
awstats awstats 6.3
awstats awstats 6.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter."
    }
  ],
  "id": "CVE-2005-0437",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14299"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14299"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390368"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-12-07 20:15
Modified
2024-11-21 05:24
Severity ?
Summary
In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.
Impacted products
Vendor Product Version
awstats awstats *
debian debian_linux 9.0
fedoraproject fedora 32



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA51A86E-8BCC-4230-97A2-92760F3D4C1D",
              "versionEndIncluding": "7.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501."
    },
    {
      "lang": "es",
      "value": "En AWStats versiones hasta 7.7, cgi-bin/awstats.pl?config= acepta un nombre de ruta absoluto, aunque su intenci\u00f3n es que solo lea un archivo en el formato /etc/awstats/awstats.conf. NOTA: este problema se presenta debido a una correcci\u00f3n incompleta para el CVE-2017-1000501"
    }
  ],
  "id": "CVE-2020-29600",
  "lastModified": "2024-11-21T05:24:17.443",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-12-07T20:15:12.837",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/issues/90"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/issues/90"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-01-18 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.
Impacted products
Vendor Product Version
awstats awstats *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "64A662D9-1187-489B-8E44-A409FFC808A6",
              "versionEndIncluding": "6.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl."
    }
  ],
  "id": "CVE-2005-0116",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-01-18T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/13893/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=185\u0026type=vulnerabilities\u0026flashstatus=false"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/272296"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/13002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/12298"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/13893/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.idefense.com/application/poi/display?id=185\u0026type=vulnerabilities\u0026flashstatus=false"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/272296"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/13002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/12298"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-07-21 14:03
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in awstats.pl in AWStats 6.5 build 1.857 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) refererpagesfilter, (2) refererpagesfilterex, (3) urlfilterex, (4) urlfilter, (5) hostfilter, or (6) hostfilterex parameters, a different set of vectors than CVE-2006-1945.
Impacted products
Vendor Product Version
awstats awstats *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAE4E972-EFD0-4226-8917-8C71CCC551AF",
              "versionEndIncluding": "6.5_1.857",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in awstats.pl in AWStats 6.5 build 1.857 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) refererpagesfilter, (2) refererpagesfilterex, (3) urlfilterex, (4) urlfilter, (5) hostfilter, or (6) hostfilterex parameters, a different set of vectors than CVE-2006-1945."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en awstats.pl de AWStats 6.5 build 1.857 y anteriores permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n a trav\u00e9s de los par\u00e1metros (1) refererpagesfilter, (2) refererpagesfilterex, (3) urlfilterex, (4) urlfilter, (5) hostfilter, o (6) hostfilterex, un juego de vectores distinto de CVE-2006-1945."
    }
  ],
  "id": "CVE-2006-3681",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.6,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-07-21T14:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19725"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22306"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/usn-360-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1421"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/19725"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-360-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1421"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25879"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to obtain sensitive information by setting the debug parameter.
Impacted products
Vendor Product Version
awstats awstats 6.3
awstats awstats 6.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to obtain sensitive information by setting the debug parameter."
    }
  ],
  "id": "CVE-2005-0438",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14299"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390368"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19477"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14299"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19477"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-12-02 16:22
Modified
2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7115E25-7D97-4CEE-A1E1-A2E5029EAD92",
              "versionEndIncluding": "6.95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "429BAD9D-2EE5-45F9-AE64-81297CB021E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA8E3D3-78F9-47E4-926A-014E277149BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26C7A8E-253B-4A5D-AA43-76272DBCE5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "257E78AE-01A0-47D3-89DC-034707061DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9472B294-86D2-4EA0-A5EC-528546582B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1FA8C0-64DF-4B52-A034-400678D086E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39BF58B2-6895-4131-8620-8DFEE7BE4A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C941C8-7433-4518-B25E-987380FBD615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC7CE6C-5542-438C-9992-47FE411F0D70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:sarge1:*:*:*:*:*:*",
              "matchCriteriaId": "BE110FB0-77EF-40AB-9FD7-6D1410AA1296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C9F6F9-04C8-4169-B779-3195E31B8616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1.857:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB81DA1-ACDD-43DC-BA06-E10DE98BE698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8DE50-16FC-4CC5-A0CE-9C7C4858285A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF1AC45-C46E-4A60-B1D9-B972E838E5AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en AWStats anterior a v7.0 permite a atacantes remotos tener un impacto no especificado a trav\u00e9s directorio LoadPlugin especialmente manipulado."
    }
  ],
  "id": "CVE-2010-4369",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-12-02T16:22:21.910",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/43004"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/45210"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1047-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0202"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/45210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1047-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0202"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-02-09 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "pluginmode", (2) "loadplugin", or (3) "noloadplugin" parameters.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) \"pluginmode\", (2) \"loadplugin\", or (3) \"noloadplugin\" parameters."
    }
  ],
  "id": "CVE-2005-0362",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-02-09T05:00:00.000",
  "references": [
    {
      "source": "security@debian.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
    },
    {
      "source": "security@debian.org",
      "url": "http://www.osvdb.org/16089"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/16089"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-12-04 03:15
Modified
2025-04-24 16:15
Summary
AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "21D87CE3-CCB4-4E9B-A0B6-035221D08ADC",
              "versionEndIncluding": "7.8",
              "versionStartIncluding": "7.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks."
    },
    {
      "lang": "es",
      "value": "AWStats 7.x a 7.8 permite XSS en el complemento hostinfo debido a que se imprime una respuesta de Net::XWhois sin las comprobaciones adecuadas."
    }
  ],
  "id": "CVE-2022-46391",
  "lastModified": "2025-04-24T16:15:23.940",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-12-04T03:15:09.967",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/AWStats/pull/226"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/AWStats/pull/226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-01-03 15:29
Modified
2024-11-21 03:04
Severity ?
Summary
Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.
Impacted products
Vendor Product Version
awstats awstats *
debian debian_linux 7.0
debian debian_linux 8.0
debian debian_linux 9.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "386B814D-4746-43AD-BF60-7D9BC930FBDC",
              "versionEndIncluding": "7.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the \"config\" and \"migrate\" parameters resulting in unauthenticated remote code execution."
    },
    {
      "lang": "es",
      "value": "Las versiones 7.6 y anteriores de Awstats son vulnerables a un error de salto de directorio en la manipulaci\u00f3n de los par\u00e1metros \"config\" y \"migrate\", lo que resulta en la ejecuci\u00f3n remota de c\u00f3digo sin autenticar."
    }
  ],
  "id": "CVE-2017-1000501",
  "lastModified": "2024-11-21T03:04:52.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-01-03T15:29:00.283",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.awstats.org/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202007-37"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.awstats.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202007-37"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4092"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2005-05-02 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog.
Impacted products
Vendor Product Version
awstats awstats 6.3
awstats awstats 6.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog."
    }
  ],
  "id": "CVE-2005-0435",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-05-02T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14299"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390368"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19333"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/14299"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/archive/1/390368"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19333"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2006-1945 (GCVE-0-2006-1945)
Vulnerability from cvelistv5
Published
2006-04-20 22:00
Modified
2024-08-07 17:35
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the config parameter. NOTE: this might be the same core issue as CVE-2005-2732.
References
http://secunia.com/advisories/20496third-party-advisory, x_refsource_SECUNIA
http://pridels0.blogspot.com/2006/04/awstats-65-vuln.htmlx_refsource_MISC
http://www.securityfocus.com/bid/17621vdb-entry, x_refsource_BID
http://security.gentoo.org/glsa/glsa-200606-06.xmlvendor-advisory, x_refsource_GENTOO
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:35:29.663Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20496",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20496"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pridels0.blogspot.com/2006/04/awstats-65-vuln.html"
          },
          {
            "name": "17621",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17621"
          },
          {
            "name": "GLSA-200606-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-04-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the config parameter.  NOTE: this might be the same core issue as CVE-2005-2732."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-05-10T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20496",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20496"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pridels0.blogspot.com/2006/04/awstats-65-vuln.html"
        },
        {
          "name": "17621",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17621"
        },
        {
          "name": "GLSA-200606-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-1945",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.5 and earlier allows remote attackers to inject arbitrary web script or HTML via the config parameter.  NOTE: this might be the same core issue as CVE-2005-2732."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20496",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20496"
            },
            {
              "name": "http://pridels0.blogspot.com/2006/04/awstats-65-vuln.html",
              "refsource": "MISC",
              "url": "http://pridels0.blogspot.com/2006/04/awstats-65-vuln.html"
            },
            {
              "name": "17621",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17621"
            },
            {
              "name": "GLSA-200606-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-1945",
    "datePublished": "2006-04-20T22:00:00",
    "dateReserved": "2006-04-20T00:00:00",
    "dateUpdated": "2024-08-07T17:35:29.663Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0435 (GCVE-0-2005-0435)
Vulnerability from cvelistv5
Published
2005-02-15 05:00
Modified
2024-08-07 21:13
Severity ?
CWE
  • n/a
Summary
awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog.
References
http://secunia.com/advisories/14299third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/19333vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/390368mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:54.237Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14299",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14299"
          },
          {
            "name": "awstats-awstatpl-obtain-information(19333)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19333"
          },
          {
            "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/390368"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14299",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14299"
        },
        {
          "name": "awstats-awstatpl-obtain-information(19333)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19333"
        },
        {
          "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/390368"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0435",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to read server web logs by setting the loadplugin and pluginmode parameters to rawlog."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14299",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14299"
            },
            {
              "name": "awstats-awstatpl-obtain-information(19333)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19333"
            },
            {
              "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/390368"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0435",
    "datePublished": "2005-02-15T05:00:00",
    "dateReserved": "2005-02-15T00:00:00",
    "dateUpdated": "2024-08-07T21:13:54.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0437 (GCVE-0-2005-0437)
Vulnerability from cvelistv5
Published
2005-02-15 05:00
Modified
2024-08-07 21:13
Severity ?
CWE
  • n/a
Summary
Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter.
References
http://secunia.com/advisories/14299third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/390368mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:54.294Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14299",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14299"
          },
          {
            "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/390368"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-05-11T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14299",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14299"
        },
        {
          "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/390368"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0437",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to include arbitrary Perl modules via .. (dot dot) sequences in the loadplugin parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14299",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14299"
            },
            {
              "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/390368"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0437",
    "datePublished": "2005-02-15T05:00:00",
    "dateReserved": "2005-02-15T00:00:00",
    "dateUpdated": "2024-08-07T21:13:54.294Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0438 (GCVE-0-2005-0438)
Vulnerability from cvelistv5
Published
2005-02-15 05:00
Modified
2024-08-07 21:13
Severity ?
CWE
  • n/a
Summary
awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to obtain sensitive information by setting the debug parameter.
References
http://secunia.com/advisories/14299third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/19477vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/390368mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:54.165Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14299",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14299"
          },
          {
            "name": "awstats-information-disclosure(19477)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19477"
          },
          {
            "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/390368"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to obtain sensitive information by setting the debug parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14299",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14299"
        },
        {
          "name": "awstats-information-disclosure(19477)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19477"
        },
        {
          "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/390368"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0438",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to obtain sensitive information by setting the debug parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14299",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14299"
            },
            {
              "name": "awstats-information-disclosure(19477)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19477"
            },
            {
              "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/390368"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0438",
    "datePublished": "2005-02-15T05:00:00",
    "dateReserved": "2005-02-15T00:00:00",
    "dateUpdated": "2024-08-07T21:13:54.165Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4368 (GCVE-0-2010-4368)
Vulnerability from cvelistv5
Published
2010-12-02 16:00
Modified
2024-09-16 19:39
Severity ?
CWE
  • n/a
Summary
awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:14.765Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#870532",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/870532"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-02T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#870532",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/870532"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4368",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#870532",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/870532"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "MISC",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            },
            {
              "name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html",
              "refsource": "MISC",
              "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4368",
    "datePublished": "2010-12-02T16:00:00Z",
    "dateReserved": "2010-12-02T00:00:00Z",
    "dateUpdated": "2024-09-16T19:39:59.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0436 (GCVE-0-2005-0436)
Vulnerability from cvelistv5
Published
2005-02-15 05:00
Modified
2024-08-07 21:13
Severity ?
CWE
  • n/a
Summary
Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to execute portions of Perl code via the PluginMode parameter.
References
http://secunia.com/advisories/14299third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/19336vdb-entry, x_refsource_XF
http://www.securityfocus.com/archive/1/390368mailing-list, x_refsource_BUGTRAQ
http://www.osvdb.org/13832vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:54.161Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "14299",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/14299"
          },
          {
            "name": "awstats-function-code-execution(19336)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19336"
          },
          {
            "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/390368"
          },
          {
            "name": "13832",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/13832"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to execute portions of Perl code via the PluginMode parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "14299",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/14299"
        },
        {
          "name": "awstats-function-code-execution(19336)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19336"
        },
        {
          "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/390368"
        },
        {
          "name": "13832",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/13832"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0436",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Direct code injection vulnerability in awstats.pl in AWStats 6.3 and 6.4 allows remote attackers to execute portions of Perl code via the PluginMode parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "14299",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/14299"
            },
            {
              "name": "awstats-function-code-execution(19336)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/19336"
            },
            {
              "name": "20050214 AWStats \u003c= 6.4 Multiple vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/390368"
            },
            {
              "name": "13832",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/13832"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0436",
    "datePublished": "2005-02-15T05:00:00",
    "dateReserved": "2005-02-15T00:00:00",
    "dateUpdated": "2024-08-07T21:13:54.161Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2237 (GCVE-0-2006-2237)
Vulnerability from cvelistv5
Published
2006-05-08 23:00
Modified
2024-08-07 17:43
Severity ?
CWE
  • n/a
Summary
The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter.
References
http://secunia.com/advisories/20710third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20186third-party-advisory, x_refsource_SECUNIA
http://awstats.sourceforge.net/awstats_security_news.phpx_refsource_CONFIRM
http://www.debian.org/security/2006/dsa-1058vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/20496third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26287vdb-entry, x_refsource_XF
http://www.vupen.com/english/advisories/2006/1678vdb-entry, x_refsource_VUPEN
http://www.osreviews.net/reviews/comm/awstatsx_refsource_MISC
http://secunia.com/advisories/20170third-party-advisory, x_refsource_SECUNIA
http://www.osvdb.org/25284vdb-entry, x_refsource_OSVDB
https://usn.ubuntu.com/285-1/vendor-advisory, x_refsource_UBUNTU
http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.htmlx_refsource_MISC
http://secunia.com/advisories/19969third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200606-06.xmlvendor-advisory, x_refsource_GENTOO
http://www.novell.com/linux/security/advisories/2006_33_awstats.htmlvendor-advisory, x_refsource_SUSE
http://www.securityfocus.com/bid/17844vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:43:28.626Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20710",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20710"
          },
          {
            "name": "20186",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20186"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/awstats_security_news.php"
          },
          {
            "name": "DSA-1058",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1058"
          },
          {
            "name": "20496",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20496"
          },
          {
            "name": "awstats-migrate-command-execution(26287)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26287"
          },
          {
            "name": "ADV-2006-1678",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1678"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.osreviews.net/reviews/comm/awstats"
          },
          {
            "name": "20170",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20170"
          },
          {
            "name": "25284",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/25284"
          },
          {
            "name": "USN-285-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/285-1/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html"
          },
          {
            "name": "19969",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19969"
          },
          {
            "name": "GLSA-200606-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
          },
          {
            "name": "SUSE-SA:2006:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
          },
          {
            "name": "17844",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17844"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-05T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20710",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20710"
        },
        {
          "name": "20186",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20186"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/awstats_security_news.php"
        },
        {
          "name": "DSA-1058",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1058"
        },
        {
          "name": "20496",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20496"
        },
        {
          "name": "awstats-migrate-command-execution(26287)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26287"
        },
        {
          "name": "ADV-2006-1678",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1678"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.osreviews.net/reviews/comm/awstats"
        },
        {
          "name": "20170",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20170"
        },
        {
          "name": "25284",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/25284"
        },
        {
          "name": "USN-285-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/285-1/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html"
        },
        {
          "name": "19969",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19969"
        },
        {
          "name": "GLSA-200606-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
        },
        {
          "name": "SUSE-SA:2006:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
        },
        {
          "name": "17844",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17844"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2237",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20710",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20710"
            },
            {
              "name": "20186",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20186"
            },
            {
              "name": "http://awstats.sourceforge.net/awstats_security_news.php",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/awstats_security_news.php"
            },
            {
              "name": "DSA-1058",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1058"
            },
            {
              "name": "20496",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20496"
            },
            {
              "name": "awstats-migrate-command-execution(26287)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26287"
            },
            {
              "name": "ADV-2006-1678",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1678"
            },
            {
              "name": "http://www.osreviews.net/reviews/comm/awstats",
              "refsource": "MISC",
              "url": "http://www.osreviews.net/reviews/comm/awstats"
            },
            {
              "name": "20170",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20170"
            },
            {
              "name": "25284",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/25284"
            },
            {
              "name": "USN-285-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/285-1/"
            },
            {
              "name": "http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html",
              "refsource": "MISC",
              "url": "http://www.vuxml.org/freebsd/2df297a2-dc74-11da-a22b-000c6ec775d9.html"
            },
            {
              "name": "19969",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19969"
            },
            {
              "name": "GLSA-200606-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200606-06.xml"
            },
            {
              "name": "SUSE-SA:2006:033",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
            },
            {
              "name": "17844",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17844"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2237",
    "datePublished": "2006-05-08T23:00:00",
    "dateReserved": "2006-05-08T00:00:00",
    "dateUpdated": "2024-08-07T17:43:28.626Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4367 (GCVE-0-2010-4367)
Vulnerability from cvelistv5
Published
2010-12-02 16:00
Modified
2024-08-07 03:43
Severity ?
CWE
  • n/a
Summary
awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:14.839Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2011:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-23T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDVSA-2011:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4367",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2011:033",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
            },
            {
              "name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html",
              "refsource": "MISC",
              "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4367",
    "datePublished": "2010-12-02T16:00:00",
    "dateReserved": "2010-12-02T00:00:00",
    "dateUpdated": "2024-08-07T03:43:14.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-35176 (GCVE-0-2020-35176)
Vulnerability from cvelistv5
Published
2020-12-11 23:16
Modified
2024-08-04 17:02
Severity ?
CWE
  • n/a
Summary
In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:02:06.840Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/issues/195"
          },
          {
            "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
          },
          {
            "name": "FEDORA-2020-4cba5f2846",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
          },
          {
            "name": "FEDORA-2020-d1aa0e030c",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-08T04:06:13",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/eldy/awstats/issues/195"
        },
        {
          "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
        },
        {
          "name": "FEDORA-2020-4cba5f2846",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
        },
        {
          "name": "FEDORA-2020-d1aa0e030c",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-35176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/eldy/awstats/issues/195",
              "refsource": "MISC",
              "url": "https://github.com/eldy/awstats/issues/195"
            },
            {
              "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
            },
            {
              "name": "FEDORA-2020-4cba5f2846",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
            },
            {
              "name": "FEDORA-2020-d1aa0e030c",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-35176",
    "datePublished": "2020-12-11T23:16:22",
    "dateReserved": "2020-12-11T00:00:00",
    "dateUpdated": "2024-08-04T17:02:06.840Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-46391 (GCVE-0-2022-46391)
Vulnerability from cvelistv5
Published
2022-12-04 00:00
Modified
2025-04-24 15:20
CWE
  • n/a
Summary
AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:31:46.485Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/eldy/AWStats/pull/226"
          },
          {
            "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3225-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
          },
          {
            "name": "FEDORA-2023-b645c7feda",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
          },
          {
            "name": "FEDORA-2023-fda5480804",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-46391",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-24T15:20:05.587410Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-79",
                "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-24T15:20:34.836Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-18T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/eldy/AWStats/pull/226"
        },
        {
          "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3225-1] awstats security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
        },
        {
          "name": "FEDORA-2023-b645c7feda",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
        },
        {
          "name": "FEDORA-2023-fda5480804",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-46391",
    "datePublished": "2022-12-04T00:00:00.000Z",
    "dateReserved": "2022-12-04T00:00:00.000Z",
    "dateUpdated": "2025-04-24T15:20:34.836Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-10245 (GCVE-0-2018-10245)
Vulnerability from cvelistv5
Published
2018-04-20 17:00
Modified
2024-09-16 20:32
Severity ?
CWE
  • n/a
Summary
A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:32:01.665Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-20T17:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-10245",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/theyiyibest/AWStatsFullPathDisclosure",
              "refsource": "MISC",
              "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-10245",
    "datePublished": "2018-04-20T17:00:00Z",
    "dateReserved": "2018-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T20:32:47.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-1000501 (GCVE-0-2017-1000501)
Vulnerability from cvelistv5
Published
2018-01-03 15:00
Modified
2024-08-05 22:00
Severity ?
CWE
  • n/a
Summary
Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:00:41.596Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-4092",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4092"
          },
          {
            "name": "[debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.awstats.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
          },
          {
            "name": "GLSA-202007-37",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202007-37"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "dateAssigned": "2017-12-29T00:00:00",
      "datePublic": "2017-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the \"config\" and \"migrate\" parameters resulting in unauthenticated remote code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-27T02:06:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-4092",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4092"
        },
        {
          "name": "[debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.awstats.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
        },
        {
          "name": "GLSA-202007-37",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202007-37"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "DATE_ASSIGNED": "2017-12-29",
          "ID": "CVE-2017-1000501",
          "REQUESTER": "jd@cpanel.net",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the \"config\" and \"migrate\" parameters resulting in unauthenticated remote code execution."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-4092",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4092"
            },
            {
              "name": "[debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
            },
            {
              "name": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651",
              "refsource": "CONFIRM",
              "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
            },
            {
              "name": "http://www.awstats.org/",
              "refsource": "MISC",
              "url": "http://www.awstats.org/"
            },
            {
              "name": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899",
              "refsource": "CONFIRM",
              "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
            },
            {
              "name": "GLSA-202007-37",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202007-37"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-1000501",
    "datePublished": "2018-01-03T15:00:00",
    "dateReserved": "2018-01-03T00:00:00",
    "dateUpdated": "2024-08-05T22:00:41.596Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2732 (GCVE-0-2005-2732)
Vulnerability from cvelistv5
Published
2005-08-29 04:00
Modified
2024-08-07 22:45
Severity ?
CWE
  • n/a
Summary
AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message.
References
http://marc.info/?l=bugtraq&m=112510261425888&w=2mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:45:02.070Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050826 AWstats Path Disclosure Vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112510261425888\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050826 AWstats Path Disclosure Vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112510261425888\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2732",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AWStats 6.4, and possibly earlier versions, allows remote attackers to obtain sensitive information via a file that does not exist in the config parameter, which reveals the path in an error message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050826 AWstats Path Disclosure Vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=112510261425888\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2732",
    "datePublished": "2005-08-29T04:00:00",
    "dateReserved": "2005-08-29T00:00:00",
    "dateUpdated": "2024-08-07T22:45:02.070Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0363 (GCVE-0-2005-0363)
Vulnerability from cvelistv5
Published
2005-02-16 05:00
Modified
2024-08-07 21:13
Severity ?
CWE
  • n/a
Summary
awstats.pl in AWStats 4.0 and 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the config parameter.
References
http://www.debian.org/security/2005/dsa-682vendor-advisory, x_refsource_DEBIAN
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:53.412Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-682",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-682"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.pl in AWStats 4.0 and 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the config parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-15T16:38:05",
        "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
        "shortName": "debian"
      },
      "references": [
        {
          "name": "DSA-682",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-682"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@debian.org",
          "ID": "CVE-2005-0363",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.pl in AWStats 4.0 and 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the config parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-682",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-682"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
    "assignerShortName": "debian",
    "cveId": "CVE-2005-0363",
    "datePublished": "2005-02-16T05:00:00",
    "dateReserved": "2005-02-11T00:00:00",
    "dateUpdated": "2024-08-07T21:13:53.412Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5080 (GCVE-0-2008-5080)
Vulnerability from cvelistv5
Published
2008-12-03 18:00
Modified
2024-08-07 10:40
Severity ?
CWE
  • n/a
Summary
awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:40:16.956Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "33002",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33002"
          },
          {
            "name": "awstats-querystring-xss(47116)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
          },
          {
            "name": "USN-686-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-686-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter.  NOTE: this issue exists because of an incomplete fix for CVE-2008-3714."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "33002",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33002"
        },
        {
          "name": "awstats-querystring-xss(47116)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
        },
        {
          "name": "USN-686-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-686-1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-5080",
    "datePublished": "2008-12-03T18:00:00",
    "dateReserved": "2008-11-14T00:00:00",
    "dateUpdated": "2024-08-07T10:40:16.956Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5020 (GCVE-0-2009-5020)
Vulnerability from cvelistv5
Published
2010-12-02 16:00
Modified
2024-09-16 18:04
Severity ?
CWE
  • n/a
Summary
Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:53.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-02T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5020",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5020",
    "datePublished": "2010-12-02T16:00:00Z",
    "dateReserved": "2010-12-02T00:00:00Z",
    "dateUpdated": "2024-09-16T18:04:20.705Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4369 (GCVE-0-2010-4369)
Vulnerability from cvelistv5
Published
2010-12-02 16:00
Modified
2024-08-07 03:43
Severity ?
CWE
  • n/a
Summary
Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.
References
http://www.vupen.com/english/advisories/2011/0202vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/45210vdb-entry, x_refsource_BID
http://www.mandriva.com/security/advisories?name=MDVSA-2011:033vendor-advisory, x_refsource_MANDRIVA
http://www.ubuntu.com/usn/USN-1047-1vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/43004third-party-advisory, x_refsource_SECUNIA
http://awstats.sourceforge.net/docs/awstats_changelog.txtx_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:14.651Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2011-0202",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0202"
          },
          {
            "name": "45210",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45210"
          },
          {
            "name": "MDVSA-2011:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
          },
          {
            "name": "USN-1047-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1047-1"
          },
          {
            "name": "43004",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43004"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-10T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2011-0202",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0202"
        },
        {
          "name": "45210",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45210"
        },
        {
          "name": "MDVSA-2011:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
        },
        {
          "name": "USN-1047-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1047-1"
        },
        {
          "name": "43004",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43004"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4369",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2011-0202",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0202"
            },
            {
              "name": "45210",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45210"
            },
            {
              "name": "MDVSA-2011:033",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
            },
            {
              "name": "USN-1047-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1047-1"
            },
            {
              "name": "43004",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43004"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4369",
    "datePublished": "2010-12-02T16:00:00",
    "dateReserved": "2010-12-02T00:00:00",
    "dateUpdated": "2024-08-07T03:43:14.651Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-3681 (GCVE-0-2006-3681)
Vulnerability from cvelistv5
Published
2006-07-18 21:00
Modified
2024-08-07 18:39
Severity ?
CWE
  • n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in awstats.pl in AWStats 6.5 build 1.857 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) refererpagesfilter, (2) refererpagesfilterex, (3) urlfilterex, (4) urlfilter, (5) hostfilter, or (6) hostfilterex parameters, a different set of vectors than CVE-2006-1945.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/25879vdb-entry, x_refsource_XF
http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.htmlx_refsource_MISC
http://www.ubuntu.com/usn/usn-360-1vendor-advisory, x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2006/1421vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/22306third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19725third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:39:53.635Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "awstats-multiple-xss(25879)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25879"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
          },
          {
            "name": "USN-360-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-360-1"
          },
          {
            "name": "ADV-2006-1421",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1421"
          },
          {
            "name": "22306",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22306"
          },
          {
            "name": "19725",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19725"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in awstats.pl in AWStats 6.5 build 1.857 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) refererpagesfilter, (2) refererpagesfilterex, (3) urlfilterex, (4) urlfilter, (5) hostfilter, or (6) hostfilterex parameters, a different set of vectors than CVE-2006-1945."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "awstats-multiple-xss(25879)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25879"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
        },
        {
          "name": "USN-360-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-360-1"
        },
        {
          "name": "ADV-2006-1421",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1421"
        },
        {
          "name": "22306",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22306"
        },
        {
          "name": "19725",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19725"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3681",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in awstats.pl in AWStats 6.5 build 1.857 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) refererpagesfilter, (2) refererpagesfilterex, (3) urlfilterex, (4) urlfilter, (5) hostfilter, or (6) hostfilterex parameters, a different set of vectors than CVE-2006-1945."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "awstats-multiple-xss(25879)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25879"
            },
            {
              "name": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html",
              "refsource": "MISC",
              "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
            },
            {
              "name": "USN-360-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-360-1"
            },
            {
              "name": "ADV-2006-1421",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1421"
            },
            {
              "name": "22306",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22306"
            },
            {
              "name": "19725",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19725"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3681",
    "datePublished": "2006-07-18T21:00:00",
    "dateReserved": "2006-07-18T00:00:00",
    "dateUpdated": "2024-08-07T18:39:53.635Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0362 (GCVE-0-2005-0362)
Vulnerability from cvelistv5
Published
2005-02-16 05:00
Modified
2024-08-07 21:13
Severity ?
CWE
  • n/a
Summary
awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) "pluginmode", (2) "loadplugin", or (3) "noloadplugin" parameters.
References
http://www.osvdb.org/16089vdb-entry, x_refsource_OSVDB
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488x_refsource_CONFIRM
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:13:53.753Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "16089",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/16089"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-02-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) \"pluginmode\", (2) \"loadplugin\", or (3) \"noloadplugin\" parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-08-18T09:00:00",
        "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
        "shortName": "debian"
      },
      "references": [
        {
          "name": "16089",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/16089"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@debian.org",
          "ID": "CVE-2005-0362",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.pl in AWStats 6.2 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) \"pluginmode\", (2) \"loadplugin\", or (3) \"noloadplugin\" parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "16089",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/16089"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=294488"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
    "assignerShortName": "debian",
    "cveId": "CVE-2005-0362",
    "datePublished": "2005-02-16T05:00:00",
    "dateReserved": "2005-02-11T00:00:00",
    "dateUpdated": "2024-08-07T21:13:53.753Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-2644 (GCVE-0-2006-2644)
Vulnerability from cvelistv5
Published
2006-05-30 10:00
Modified
2024-08-07 17:58
Severity ?
CWE
  • n/a
Summary
AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.
References
http://secunia.com/advisories/20710third-party-advisory, x_refsource_SECUNIA
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910x_refsource_CONFIRM
http://secunia.com/advisories/20502third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20164third-party-advisory, x_refsource_SECUNIA
http://www.osreviews.net/reviews/comm/awstatsx_refsource_MISC
http://www.vupen.com/english/advisories/2006/1998vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/18327vdb-entry, x_refsource_BID
http://www.debian.org/security/2006/dsa-1075vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/20283third-party-advisory, x_refsource_SECUNIA
https://usn.ubuntu.com/290-1/vendor-advisory, x_refsource_UBUNTU
http://www.novell.com/linux/security/advisories/2006_33_awstats.htmlvendor-advisory, x_refsource_SUSE
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:58:51.684Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20710",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20710"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910"
          },
          {
            "name": "20502",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20502"
          },
          {
            "name": "20164",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20164"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.osreviews.net/reviews/comm/awstats"
          },
          {
            "name": "ADV-2006-1998",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1998"
          },
          {
            "name": "18327",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18327"
          },
          {
            "name": "DSA-1075",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1075"
          },
          {
            "name": "20283",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20283"
          },
          {
            "name": "USN-290-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/290-1/"
          },
          {
            "name": "SUSE-SA:2006:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20710",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20710"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910"
        },
        {
          "name": "20502",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20502"
        },
        {
          "name": "20164",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20164"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.osreviews.net/reviews/comm/awstats"
        },
        {
          "name": "ADV-2006-1998",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1998"
        },
        {
          "name": "18327",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18327"
        },
        {
          "name": "DSA-1075",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1075"
        },
        {
          "name": "20283",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20283"
        },
        {
          "name": "USN-290-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/290-1/"
        },
        {
          "name": "SUSE-SA:2006:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to awstats.pl to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20710",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20710"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=365910"
            },
            {
              "name": "20502",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20502"
            },
            {
              "name": "20164",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20164"
            },
            {
              "name": "http://www.osreviews.net/reviews/comm/awstats",
              "refsource": "MISC",
              "url": "http://www.osreviews.net/reviews/comm/awstats"
            },
            {
              "name": "ADV-2006-1998",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1998"
            },
            {
              "name": "18327",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18327"
            },
            {
              "name": "DSA-1075",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1075"
            },
            {
              "name": "20283",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20283"
            },
            {
              "name": "USN-290-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/290-1/"
            },
            {
              "name": "SUSE-SA:2006:033",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_33_awstats.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2644",
    "datePublished": "2006-05-30T10:00:00",
    "dateReserved": "2006-05-30T00:00:00",
    "dateUpdated": "2024-08-07T17:58:51.684Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-3714 (GCVE-0-2008-3714)
Vulnerability from cvelistv5
Published
2008-08-19 19:10
Modified
2024-08-07 09:52
Severity ?
CWE
  • n/a
Summary
Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.8 allows remote attackers to inject arbitrary web script or HTML via the query_string, a different vulnerability than CVE-2006-3681 and CVE-2006-1945.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T09:52:59.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "32939",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32939"
          },
          {
            "name": "31519",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31519"
          },
          {
            "name": "33002",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33002"
          },
          {
            "name": "31759",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31759"
          },
          {
            "name": "DSA-1679",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1679"
          },
          {
            "name": "ADV-2008-2399",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2399"
          },
          {
            "name": "1020704",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020704"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2001151\u0026group_id=13764\u0026atid=113764"
          },
          {
            "name": "awstats-awstats-xss(44504)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44504"
          },
          {
            "name": "MDVSA-2008:203",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:203"
          },
          {
            "name": "FEDORA-2008-7663",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html"
          },
          {
            "name": "30730",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/30730"
          },
          {
            "name": "FEDORA-2008-7684",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          },
          {
            "name": "USN-686-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-686-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.8 allows remote attackers to inject arbitrary web script or HTML via the query_string, a different vulnerability than CVE-2006-3681 and CVE-2006-1945."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "32939",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32939"
        },
        {
          "name": "31519",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31519"
        },
        {
          "name": "33002",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33002"
        },
        {
          "name": "31759",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31759"
        },
        {
          "name": "DSA-1679",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1679"
        },
        {
          "name": "ADV-2008-2399",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2399"
        },
        {
          "name": "1020704",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020704"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2001151\u0026group_id=13764\u0026atid=113764"
        },
        {
          "name": "awstats-awstats-xss(44504)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44504"
        },
        {
          "name": "MDVSA-2008:203",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:203"
        },
        {
          "name": "FEDORA-2008-7663",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html"
        },
        {
          "name": "30730",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/30730"
        },
        {
          "name": "FEDORA-2008-7684",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        },
        {
          "name": "USN-686-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-686-1"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-3714",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in awstats.pl in AWStats 6.8 allows remote attackers to inject arbitrary web script or HTML via the query_string, a different vulnerability than CVE-2006-3681 and CVE-2006-1945."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "32939",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32939"
            },
            {
              "name": "31519",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31519"
            },
            {
              "name": "33002",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33002"
            },
            {
              "name": "31759",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31759"
            },
            {
              "name": "DSA-1679",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1679"
            },
            {
              "name": "ADV-2008-2399",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2399"
            },
            {
              "name": "1020704",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020704"
            },
            {
              "name": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2001151\u0026group_id=13764\u0026atid=113764",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/tracker/index.php?func=detail\u0026aid=2001151\u0026group_id=13764\u0026atid=113764"
            },
            {
              "name": "awstats-awstats-xss(44504)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/44504"
            },
            {
              "name": "MDVSA-2008:203",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:203"
            },
            {
              "name": "FEDORA-2008-7663",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00107.html"
            },
            {
              "name": "30730",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/30730"
            },
            {
              "name": "FEDORA-2008-7684",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2008-September/msg00355.html"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            },
            {
              "name": "USN-686-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-686-1"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-3714",
    "datePublished": "2008-08-19T19:10:00",
    "dateReserved": "2008-08-19T00:00:00",
    "dateUpdated": "2024-08-07T09:52:59.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-3682 (GCVE-0-2006-3682)
Vulnerability from cvelistv5
Published
2006-07-18 21:00
Modified
2024-08-07 18:39
Severity ?
CWE
  • n/a
Summary
awstats.pl in AWStats 6.5 build 1.857 and earlier allows remote attackers to obtain the installation path via the (1) year, (2) pluginmode or (3) month parameters.
References
http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.htmlx_refsource_MISC
http://www.ubuntu.com/usn/usn-360-1vendor-advisory, x_refsource_UBUNTU
http://www.vupen.com/english/advisories/2006/1421vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/25880vdb-entry, x_refsource_XF
http://secunia.com/advisories/22306third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19725third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T18:39:53.566Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
          },
          {
            "name": "USN-360-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-360-1"
          },
          {
            "name": "ADV-2006-1421",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1421"
          },
          {
            "name": "awstats-multiple-path-disclosure(25880)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25880"
          },
          {
            "name": "22306",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22306"
          },
          {
            "name": "19725",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19725"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.pl in AWStats 6.5 build 1.857 and earlier allows remote attackers to obtain the installation path via the (1) year, (2) pluginmode or (3) month parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
        },
        {
          "name": "USN-360-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-360-1"
        },
        {
          "name": "ADV-2006-1421",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1421"
        },
        {
          "name": "awstats-multiple-path-disclosure(25880)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25880"
        },
        {
          "name": "22306",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22306"
        },
        {
          "name": "19725",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19725"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-3682",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.pl in AWStats 6.5 build 1.857 and earlier allows remote attackers to obtain the installation path via the (1) year, (2) pluginmode or (3) month parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html",
              "refsource": "MISC",
              "url": "http://pridels0.blogspot.com/2006/04/awstats-65x-multiple-vuln.html"
            },
            {
              "name": "USN-360-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/usn-360-1"
            },
            {
              "name": "ADV-2006-1421",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1421"
            },
            {
              "name": "awstats-multiple-path-disclosure(25880)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/25880"
            },
            {
              "name": "22306",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22306"
            },
            {
              "name": "19725",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19725"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-3682",
    "datePublished": "2006-07-18T21:00:00",
    "dateReserved": "2006-07-18T00:00:00",
    "dateUpdated": "2024-08-07T18:39:53.566Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-29600 (GCVE-0-2020-29600)
Vulnerability from cvelistv5
Published
2020-12-07 19:52
Modified
2024-08-04 16:55
Severity ?
CWE
  • n/a
Summary
In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T16:55:10.624Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/issues/90"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
          },
          {
            "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
          },
          {
            "name": "FEDORA-2020-d1aa0e030c",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-08T04:06:12",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/eldy/awstats/issues/90"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
        },
        {
          "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
        },
        {
          "name": "FEDORA-2020-d1aa0e030c",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-29600",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/eldy/awstats/issues/90",
              "refsource": "MISC",
              "url": "https://github.com/eldy/awstats/issues/90"
            },
            {
              "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469",
              "refsource": "MISC",
              "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
            },
            {
              "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
            },
            {
              "name": "FEDORA-2020-d1aa0e030c",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-29600",
    "datePublished": "2020-12-07T19:52:14",
    "dateReserved": "2020-12-07T00:00:00",
    "dateUpdated": "2024-08-04T16:55:10.624Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-0116 (GCVE-0-2005-0116)
Vulnerability from cvelistv5
Published
2005-01-19 05:00
Modified
2024-08-07 21:05
Severity ?
CWE
  • n/a
Summary
AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:05:23.994Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20050117 AWStats Remote Command Execution Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=185\u0026type=vulnerabilities\u0026flashstatus=false"
          },
          {
            "name": "12298",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12298"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf"
          },
          {
            "name": "VU#272296",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/272296"
          },
          {
            "name": "13002",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/13002"
          },
          {
            "name": "13893",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13893/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-01-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-02-15T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20050117 AWStats Remote Command Execution Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=185\u0026type=vulnerabilities\u0026flashstatus=false"
        },
        {
          "name": "12298",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12298"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf"
        },
        {
          "name": "VU#272296",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/272296"
        },
        {
          "name": "13002",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/13002"
        },
        {
          "name": "13893",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13893/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-0116",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AWStats 6.1, and other versions before 6.3, allows remote attackers to execute arbitrary commands via shell metacharacters in the configdir parameter to aswtats.pl."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20050117 AWStats Remote Command Execution Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=185\u0026type=vulnerabilities\u0026flashstatus=false"
            },
            {
              "name": "12298",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12298"
            },
            {
              "name": "http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/0501-exploits/AWStatsVulnAnalysis.pdf"
            },
            {
              "name": "VU#272296",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/272296"
            },
            {
              "name": "13002",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/13002"
            },
            {
              "name": "13893",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13893/"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-0116",
    "datePublished": "2005-01-19T05:00:00",
    "dateReserved": "2005-01-18T00:00:00",
    "dateUpdated": "2024-08-07T21:05:23.994Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-1527 (GCVE-0-2005-1527)
Vulnerability from cvelistv5
Published
2005-08-15 04:00
Modified
2024-08-07 21:51
Severity ?
CWE
  • n/a
Summary
Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
References
http://www.osvdb.org/18696vdb-entry, x_refsource_OSVDB
https://usn.ubuntu.com/167-1/vendor-advisory, x_refsource_UBUNTU
http://www.securiteam.com/unixfocus/5DP0J00GKE.htmlx_refsource_MISC
http://www.novell.com/linux/security/advisories/2005_19_sr.htmlvendor-advisory, x_refsource_SUSE
http://www.debian.org/security/2005/dsa-892vendor-advisory, x_refsource_DEBIAN
http://secunia.com/advisories/17463third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/21769vdb-entry, x_refsource_XF
http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=falsethird-party-advisory, x_refsource_IDEFENSE
http://secunia.com/advisories/16412third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1014636vdb-entry, x_refsource_SECTRACK
http://www.securityfocus.com/bid/14525vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T21:51:50.264Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18696",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/18696"
          },
          {
            "name": "USN-167-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/167-1/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securiteam.com/unixfocus/5DP0J00GKE.html"
          },
          {
            "name": "SUSE-SR:2005:019",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
          },
          {
            "name": "DSA-892",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-892"
          },
          {
            "name": "17463",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17463"
          },
          {
            "name": "awstats-eval-execute-commands(21769)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769"
          },
          {
            "name": "20050809 AWStats ShowInfoURL Remote Command Execution Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=290\u0026type=vulnerabilities\u0026flashstatus=false"
          },
          {
            "name": "16412",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16412"
          },
          {
            "name": "1014636",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1014636"
          },
          {
            "name": "14525",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14525"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18696",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/18696"
        },
        {
          "name": "USN-167-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/167-1/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securiteam.com/unixfocus/5DP0J00GKE.html"
        },
        {
          "name": "SUSE-SR:2005:019",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
        },
        {
          "name": "DSA-892",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-892"
        },
        {
          "name": "17463",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17463"
        },
        {
          "name": "awstats-eval-execute-commands(21769)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769"
        },
        {
          "name": "20050809 AWStats ShowInfoURL Remote Command Execution Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=290\u0026type=vulnerabilities\u0026flashstatus=false"
        },
        {
          "name": "16412",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16412"
        },
        {
          "name": "1014636",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1014636"
        },
        {
          "name": "14525",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14525"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-1527",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18696",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/18696"
            },
            {
              "name": "USN-167-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/167-1/"
            },
            {
              "name": "http://www.securiteam.com/unixfocus/5DP0J00GKE.html",
              "refsource": "MISC",
              "url": "http://www.securiteam.com/unixfocus/5DP0J00GKE.html"
            },
            {
              "name": "SUSE-SR:2005:019",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
            },
            {
              "name": "DSA-892",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-892"
            },
            {
              "name": "17463",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17463"
            },
            {
              "name": "awstats-eval-execute-commands(21769)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/21769"
            },
            {
              "name": "20050809 AWStats ShowInfoURL Remote Command Execution Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=290\u0026type=vulnerabilities\u0026flashstatus=false"
            },
            {
              "name": "16412",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16412"
            },
            {
              "name": "1014636",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1014636"
            },
            {
              "name": "14525",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14525"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-1527",
    "datePublished": "2005-08-15T04:00:00",
    "dateReserved": "2005-05-12T00:00:00",
    "dateUpdated": "2024-08-07T21:51:50.264Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}