![]() Nmap -sV -script http-awstatstotals-exec. Example Usage nmap -sV -script http-awstatstotals-exec.nse -script-args 'http-awstatstotals-exec.cmd="uname -a", http-awstatstotals-exec.uri=/awstats/index.php' See the documentation for the smbauth library. smbdomain, smbhash, smbnoguest, smbpassword, smbtype, smbusername See the documentation for the http library. http.host, http.max-body-size, http.max-cache-size, http.max-pipeline, http.pipeline, uncated-ok, eragent See the documentation for the slaxml library. eragent - User Agent to use in GET request bug Other useful args when running this script: A remote attacker could possibly use this issue to execute arbitrary code. Default: whoami http-awstatstotals-exec.outfile Releases o Ubuntu 20.10 o Ubuntu 20.04 LTS o Ubuntu 18.04 LTS o Ubuntu 16.04 ESM Packages o awstats - powerful and featureful web server log analyzer Details Sean Boran discovered that AWStats incorrectly filtered certain parameters. Default: /index.php http-awstatstotals-exec.cmdĬommand to execute. Script Arguments http-awstatstotals-exec.uriĪwstats Totals URI including path. Detailed information about the Ubuntu 5.04 / 5.10 : awstats vulnerability (USN-285-1) Nessus plugin (21588) including list of exploits and PoCs found on. The script queries the web server with the command payload encoded using PHP's This vulnerability can be exploited through the GET variable sort. Each administrator can customize the list of products for which he wants to receive vulnerability alerts.Script Arguments Example Usage Script Output Script http-awstatstotals-execĮxploits a remote code execution vulnerability in Awstats Totals 1.0 up to 1.14Īnd possibly other products based on it (CVE: 2008-3922). ( Request your free trial) Computer vulnerabilities tracking provides a network vulnerability workaround. ![]() rpmįull bulletin, software filtering, emails, fixes. p ub/suse/up date/10.1/ rpm/noarch /awstats-6. Size/MD5 checksum: 728566 d3241a30634640b4f363097f751e7282įtp://ftp. Remote exploitation of an input validation vulnerability in AWStats allows remote attackers to execute arbitrary commands. bi an.org/poo l/updates/ main/a/aws tats/awsta ts_6.4-1sa rge2_all.d eb bi an.org/poo l/updates/ main/a/aws tats/awsta ts_6.4.ori g.tar.gz bi an.org/poo l/updates/ main/a/aws tats/awsta ts_6.4-1sa rge2.diff. bi an.org/poo l/updates/ main/a/aws tats/awsta ts_6.4-1sa rge2.dsc Solutions for this threat AWStats: version 6.6. An attacker with a technician ability can exploit this computer weakness bulletin. The trust level is of type confirmed by the editor, with an origin of intranet client.Ī proof of concept or an attack tool is available, so your teams have to process this alert. Our team determined that the severity of this weakness announce is important. This computer threat alert impacts software or systems such as Debian, openSUSE, Unix (platform) ~ not comprehensive. This vulnerability therefore permits a remote attacker to execute commands with AWStats rights.įull bulletin, software filtering, emails, fixes. An attacker can therefore run a shell command using the open() function. However, the '|' character is not filtered. It is written in PERL, and displays its statistics on a web server.ĭata of "migrate" parameter are sent to PERL open() function. The AWStats program generates web, ftp or mail statistics. Vulnerable systems: Debian, openSUSE, Unix (platform) ~ not comprehensive. Vulnerability of AWStats: command execution with migrate Synthesis of the vulnerabilityĪn attacker can use a special migrate parameter in order to execute a shell command on server.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |