Search criteria

75 vulnerabilities found for awstats by awstats

FKIE_CVE-2022-46391

Vulnerability from fkie_nvd - Published: 2022-12-04 03:15 - Updated: 2025-04-24 16:15
Summary
AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "21D87CE3-CCB4-4E9B-A0B6-035221D08ADC",
              "versionEndIncluding": "7.8",
              "versionStartIncluding": "7.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks."
    },
    {
      "lang": "es",
      "value": "AWStats 7.x a 7.8 permite XSS en el complemento hostinfo debido a que se imprime una respuesta de Net::XWhois sin las comprobaciones adecuadas."
    }
  ],
  "id": "CVE-2022-46391",
  "lastModified": "2025-04-24T16:15:23.940",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2022-12-04T03:15:09.967",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/AWStats/pull/226"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/AWStats/pull/226"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

FKIE_CVE-2020-35176

Vulnerability from fkie_nvd - Published: 2020-12-12 00:15 - Updated: 2024-11-21 05:26
Summary
In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "543AC33E-6B91-491D-B885-CF67915A7726",
              "versionEndIncluding": "7.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600."
    },
    {
      "lang": "es",
      "value": "En AWStats versiones hasta 7.8, cgi-bin/awstats.pl?config= acepta un nombre de ruta absoluto parcial (omitiendo el inicio /etc), aunque solo estaba destinado a leer un archivo en el formato /etc/awstats/awstats.conf.\u0026#xa0;NOTA: este problema se presenta debido a una correcci\u00f3n incompleta para CVE-2017-1000501 y CVE-2020-29600"
    }
  ],
  "id": "CVE-2020-35176",
  "lastModified": "2024-11-21T05:26:54.303",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-12-12T00:15:12.140",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/issues/195"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/issues/195"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2020-29600

Vulnerability from fkie_nvd - Published: 2020-12-07 20:15 - Updated: 2024-11-21 05:24
Severity ?
Summary
In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.
Impacted products
Vendor Product Version
awstats awstats *
debian debian_linux 9.0
fedoraproject fedora 32

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA51A86E-8BCC-4230-97A2-92760F3D4C1D",
              "versionEndIncluding": "7.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501."
    },
    {
      "lang": "es",
      "value": "En AWStats versiones hasta 7.7, cgi-bin/awstats.pl?config= acepta un nombre de ruta absoluto, aunque su intenci\u00f3n es que solo lea un archivo en el formato /etc/awstats/awstats.conf. NOTA: este problema se presenta debido a una correcci\u00f3n incompleta para el CVE-2017-1000501"
    }
  ],
  "id": "CVE-2020-29600",
  "lastModified": "2024-11-21T05:24:17.443",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-12-07T20:15:12.837",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/issues/90"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/issues/90"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2018-10245

Vulnerability from fkie_nvd - Published: 2018-04-20 17:29 - Updated: 2024-11-21 03:41
Summary
A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters.
Impacted products
Vendor Product Version
awstats awstats *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E6C81FF-D807-4161-B7C3-06E66A2EDBE6",
              "versionEndIncluding": "7.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de divulgaci\u00f3n de ruta completa en AWStats, hasta la versi\u00f3n 7.6, permite que atacantes remotos sepan d\u00f3nde est\u00e1 alojado el archivo de configuraci\u00f3n, lo que les permite obtener la ruta completa del servidor. Este problema es similar a CVE-2006-3682. El ataque puede, por ejemplo, emplear los par\u00e1metros framename y update en awstats.pl."
    }
  ],
  "id": "CVE-2018-10245",
  "lastModified": "2024-11-21T03:41:06.093",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-20T17:29:00.243",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2017-1000501

Vulnerability from fkie_nvd - Published: 2018-01-03 15:29 - Updated: 2024-11-21 03:04
Severity ?
Summary
Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.
Impacted products
Vendor Product Version
awstats awstats *
debian debian_linux 7.0
debian debian_linux 8.0
debian debian_linux 9.0

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "386B814D-4746-43AD-BF60-7D9BC930FBDC",
              "versionEndIncluding": "7.6.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the \"config\" and \"migrate\" parameters resulting in unauthenticated remote code execution."
    },
    {
      "lang": "es",
      "value": "Las versiones 7.6 y anteriores de Awstats son vulnerables a un error de salto de directorio en la manipulaci\u00f3n de los par\u00e1metros \"config\" y \"migrate\", lo que resulta en la ejecuci\u00f3n remota de c\u00f3digo sin autenticar."
    }
  ],
  "id": "CVE-2017-1000501",
  "lastModified": "2024-11-21T03:04:52.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-01-03T15:29:00.283",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.awstats.org/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/202007-37"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4092"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.awstats.org/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/202007-37"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2018/dsa-4092"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2010-4369

Vulnerability from fkie_nvd - Published: 2010-12-02 16:22 - Updated: 2025-04-11 00:51
Severity ?
Summary
Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7115E25-7D97-4CEE-A1E1-A2E5029EAD92",
              "versionEndIncluding": "6.95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "429BAD9D-2EE5-45F9-AE64-81297CB021E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA8E3D3-78F9-47E4-926A-014E277149BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26C7A8E-253B-4A5D-AA43-76272DBCE5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "257E78AE-01A0-47D3-89DC-034707061DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9472B294-86D2-4EA0-A5EC-528546582B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1FA8C0-64DF-4B52-A034-400678D086E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39BF58B2-6895-4131-8620-8DFEE7BE4A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C941C8-7433-4518-B25E-987380FBD615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC7CE6C-5542-438C-9992-47FE411F0D70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:sarge1:*:*:*:*:*:*",
              "matchCriteriaId": "BE110FB0-77EF-40AB-9FD7-6D1410AA1296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C9F6F9-04C8-4169-B779-3195E31B8616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1.857:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB81DA1-ACDD-43DC-BA06-E10DE98BE698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8DE50-16FC-4CC5-A0CE-9C7C4858285A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF1AC45-C46E-4A60-B1D9-B972E838E5AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de salto de directorio en AWStats anterior a v7.0 permite a atacantes remotos tener un impacto no especificado a trav\u00e9s directorio LoadPlugin especialmente manipulado."
    }
  ],
  "id": "CVE-2010-4369",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-12-02T16:22:21.910",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/43004"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/45210"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1047-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0202"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/43004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/45210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1047-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0202"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2010-4368

Vulnerability from fkie_nvd - Published: 2010-12-02 16:22 - Updated: 2025-04-11 00:51
Severity ?
Summary
awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7115E25-7D97-4CEE-A1E1-A2E5029EAD92",
              "versionEndIncluding": "6.95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "429BAD9D-2EE5-45F9-AE64-81297CB021E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA8E3D3-78F9-47E4-926A-014E277149BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26C7A8E-253B-4A5D-AA43-76272DBCE5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "257E78AE-01A0-47D3-89DC-034707061DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9472B294-86D2-4EA0-A5EC-528546582B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1FA8C0-64DF-4B52-A034-400678D086E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39BF58B2-6895-4131-8620-8DFEE7BE4A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C941C8-7433-4518-B25E-987380FBD615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC7CE6C-5542-438C-9992-47FE411F0D70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:sarge1:*:*:*:*:*:*",
              "matchCriteriaId": "BE110FB0-77EF-40AB-9FD7-6D1410AA1296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C9F6F9-04C8-4169-B779-3195E31B8616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1.857:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB81DA1-ACDD-43DC-BA06-E10DE98BE698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8DE50-16FC-4CC5-A0CE-9C7C4858285A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF1AC45-C46E-4A60-B1D9-B972E838E5AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CF61F35-5905-4BA9-AD7E-7DB261D2F256",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname."
    },
    {
      "lang": "es",
      "value": "awstats.cgi en AWStats anterior a v7.0 en Windows  acepta un par\u00e1metro configdir en la URL, permitiendo a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un fichero de configuraci\u00f3n manipulado situado en una ruta de acceso compartido UNC."
    }
  ],
  "id": "CVE-2010-4368",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-12-02T16:22:21.880",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/870532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/870532"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2010-4367

Vulnerability from fkie_nvd - Published: 2010-12-02 16:22 - Updated: 2025-04-11 00:51
Severity ?
Summary
awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7115E25-7D97-4CEE-A1E1-A2E5029EAD92",
              "versionEndIncluding": "6.95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "429BAD9D-2EE5-45F9-AE64-81297CB021E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA8E3D3-78F9-47E4-926A-014E277149BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26C7A8E-253B-4A5D-AA43-76272DBCE5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "257E78AE-01A0-47D3-89DC-034707061DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9472B294-86D2-4EA0-A5EC-528546582B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1FA8C0-64DF-4B52-A034-400678D086E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39BF58B2-6895-4131-8620-8DFEE7BE4A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C941C8-7433-4518-B25E-987380FBD615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEC7CE6C-5542-438C-9992-47FE411F0D70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4_1:sarge1:*:*:*:*:*:*",
              "matchCriteriaId": "BE110FB0-77EF-40AB-9FD7-6D1410AA1296",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C9F6F9-04C8-4169-B779-3195E31B8616",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5_1.857:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DB81DA1-ACDD-43DC-BA06-E10DE98BE698",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8DE50-16FC-4CC5-A0CE-9C7C4858285A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF1AC45-C46E-4A60-B1D9-B972E838E5AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server."
    },
    {
      "lang": "es",
      "value": "awstats.cgi en AWStats anterior a v7.0 en Windows  acepta un par\u00e1metro configdir en la URL, permitiendo a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de un fichero de configuraci\u00f3n manipulado situado en (1) un servidor WebDAV o (2) en un servidor NFS."
    }
  ],
  "id": "CVE-2010-4367",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-12-02T16:22:21.847",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2009-5020

Vulnerability from fkie_nvd - Published: 2010-12-02 16:22 - Updated: 2025-04-11 00:51
Severity ?
Summary
Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "966ED168-9738-44FA-85B1-B0183C2AEEFE",
              "versionEndIncluding": "6.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "429BAD9D-2EE5-45F9-AE64-81297CB021E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.1.:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA8E3D3-78F9-47E4-926A-014E277149BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D26C7A8E-253B-4A5D-AA43-76272DBCE5E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "257E78AE-01A0-47D3-89DC-034707061DEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9472B294-86D2-4EA0-A5EC-528546582B41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1FA8C0-64DF-4B52-A034-400678D086E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "39BF58B2-6895-4131-8620-8DFEE7BE4A45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "255AE13F-5A3E-4A8E-B453-C9B10971E2E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "81C941C8-7433-4518-B25E-987380FBD615",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBA8DE50-16FC-4CC5-A0CE-9C7C4858285A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de redirecci\u00f3n abierta en awredir.pl en AWStats anterior a v6.95 permite a atacantes remotos redireccionar a usuarios a sitios web de su elecci\u00f3n y llevar a cabo ataques de phishing a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2009-5020",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-12-02T16:22:20.613",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-5080

Vulnerability from fkie_nvd - Published: 2008-12-03 18:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB95D838-4A64-4FEE-82BB-E3788A87215F",
              "versionEndIncluding": "6.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13B168A-5B44-48F9-891B-0BB28AD02721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1ADC1071-123D-4C66-BFEE-D140ABCD273B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E169347-2804-4DC0-9EC9-B3840C719EFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34318EAF-8E44-49AF-87C0-A2C0BB981D62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "058FD0C7-1E3F-4EDF-B024-F9D572D78693",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "882C578E-14B6-4003-A9B2-0366F7EDCEC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E916066B-7CB0-4111-A450-6313724D4805",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE32264-0980-4122-AA46-0E40D1432103",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "353361B9-864D-41E1-B4C0-337EA5373B82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:5.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4119D0EC-66BB-4C55-80E1-6D458492E978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C5DFFC3-A628-4569-9AB7-3C60C3F5DDC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B1B44AB-45F0-4E0A-8529-610C6B8934BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "312C3DA6-D34A-4566-923E-F2ECD613EF96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "24439BBC-DEDA-4309-B8B5-78289476052B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "25550AA8-8C79-48EA-A904-896B5B00077B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E37231F4-DEC9-46A7-8686-9B3C710CA396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D01C869D-EB1E-4204-A445-FBE28608321C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:awstats:awstats:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "617FF6E9-7C2C-48B4-B590-7F0E33367311",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter.  NOTE: this issue exists because of an incomplete fix for CVE-2008-3714."
    },
    {
      "lang": "es",
      "value": "awstats.pl en AWStats 6.8 y versiones anteriores no borrar apropiadamente el car\u00e1cter de comilla simple, el cual permite a los atacantes remotos realizas un ataque de secuencias de comandos en sitios cruzados (XSS) a trav\u00e9s del par\u00e1metro query_string. NOTA: Este asunto existe por una incompleta soluci\u00f3n para CVE-2008-3714."
    }
  ],
  "id": "CVE-2008-5080",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-12-03T18:30:00.430",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/33002"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/usn-686-1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/usn-686-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2022-46391 (GCVE-0-2022-46391)

Vulnerability from cvelistv5 – Published: 2022-12-04 00:00 – Updated: 2025-04-24 15:20
VLAI?
Summary
AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:31:46.485Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/eldy/AWStats/pull/226"
          },
          {
            "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3225-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
          },
          {
            "name": "FEDORA-2023-b645c7feda",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
          },
          {
            "name": "FEDORA-2023-fda5480804",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-46391",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-24T15:20:05.587410Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-79",
                "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-24T15:20:34.836Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-18T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/eldy/AWStats/pull/226"
        },
        {
          "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3225-1] awstats security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
        },
        {
          "name": "FEDORA-2023-b645c7feda",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
        },
        {
          "name": "FEDORA-2023-fda5480804",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-46391",
    "datePublished": "2022-12-04T00:00:00.000Z",
    "dateReserved": "2022-12-04T00:00:00.000Z",
    "dateUpdated": "2025-04-24T15:20:34.836Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-35176 (GCVE-0-2020-35176)

Vulnerability from cvelistv5 – Published: 2020-12-11 23:16 – Updated: 2024-08-04 17:02
VLAI?
Summary
In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:02:06.840Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/issues/195"
          },
          {
            "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
          },
          {
            "name": "FEDORA-2020-4cba5f2846",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
          },
          {
            "name": "FEDORA-2020-d1aa0e030c",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-08T04:06:13",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/eldy/awstats/issues/195"
        },
        {
          "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
        },
        {
          "name": "FEDORA-2020-4cba5f2846",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
        },
        {
          "name": "FEDORA-2020-d1aa0e030c",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-35176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/eldy/awstats/issues/195",
              "refsource": "MISC",
              "url": "https://github.com/eldy/awstats/issues/195"
            },
            {
              "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
            },
            {
              "name": "FEDORA-2020-4cba5f2846",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
            },
            {
              "name": "FEDORA-2020-d1aa0e030c",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-35176",
    "datePublished": "2020-12-11T23:16:22",
    "dateReserved": "2020-12-11T00:00:00",
    "dateUpdated": "2024-08-04T17:02:06.840Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-29600 (GCVE-0-2020-29600)

Vulnerability from cvelistv5 – Published: 2020-12-07 19:52 – Updated: 2024-08-04 16:55
VLAI?
Summary
In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T16:55:10.624Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/issues/90"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
          },
          {
            "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
          },
          {
            "name": "FEDORA-2020-d1aa0e030c",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-08T04:06:12",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/eldy/awstats/issues/90"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
        },
        {
          "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
        },
        {
          "name": "FEDORA-2020-d1aa0e030c",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-29600",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/eldy/awstats/issues/90",
              "refsource": "MISC",
              "url": "https://github.com/eldy/awstats/issues/90"
            },
            {
              "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469",
              "refsource": "MISC",
              "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
            },
            {
              "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
            },
            {
              "name": "FEDORA-2020-d1aa0e030c",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-29600",
    "datePublished": "2020-12-07T19:52:14",
    "dateReserved": "2020-12-07T00:00:00",
    "dateUpdated": "2024-08-04T16:55:10.624Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-10245 (GCVE-0-2018-10245)

Vulnerability from cvelistv5 – Published: 2018-04-20 17:00 – Updated: 2024-09-16 20:32
VLAI?
Summary
A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:32:01.665Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-20T17:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-10245",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/theyiyibest/AWStatsFullPathDisclosure",
              "refsource": "MISC",
              "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-10245",
    "datePublished": "2018-04-20T17:00:00Z",
    "dateReserved": "2018-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T20:32:47.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-1000501 (GCVE-0-2017-1000501)

Vulnerability from cvelistv5 – Published: 2018-01-03 15:00 – Updated: 2024-08-05 22:00
VLAI?
Summary
Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:00:41.596Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-4092",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4092"
          },
          {
            "name": "[debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.awstats.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
          },
          {
            "name": "GLSA-202007-37",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202007-37"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "dateAssigned": "2017-12-29T00:00:00",
      "datePublic": "2017-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the \"config\" and \"migrate\" parameters resulting in unauthenticated remote code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-27T02:06:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-4092",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4092"
        },
        {
          "name": "[debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.awstats.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
        },
        {
          "name": "GLSA-202007-37",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202007-37"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "DATE_ASSIGNED": "2017-12-29",
          "ID": "CVE-2017-1000501",
          "REQUESTER": "jd@cpanel.net",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the \"config\" and \"migrate\" parameters resulting in unauthenticated remote code execution."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-4092",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4092"
            },
            {
              "name": "[debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
            },
            {
              "name": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651",
              "refsource": "CONFIRM",
              "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
            },
            {
              "name": "http://www.awstats.org/",
              "refsource": "MISC",
              "url": "http://www.awstats.org/"
            },
            {
              "name": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899",
              "refsource": "CONFIRM",
              "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
            },
            {
              "name": "GLSA-202007-37",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202007-37"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-1000501",
    "datePublished": "2018-01-03T15:00:00",
    "dateReserved": "2018-01-03T00:00:00",
    "dateUpdated": "2024-08-05T22:00:41.596Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4368 (GCVE-0-2010-4368)

Vulnerability from cvelistv5 – Published: 2010-12-02 16:00 – Updated: 2024-09-16 19:39
VLAI?
Summary
awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:14.765Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#870532",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/870532"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-02T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#870532",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/870532"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4368",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#870532",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/870532"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "MISC",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            },
            {
              "name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html",
              "refsource": "MISC",
              "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4368",
    "datePublished": "2010-12-02T16:00:00Z",
    "dateReserved": "2010-12-02T00:00:00Z",
    "dateUpdated": "2024-09-16T19:39:59.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5020 (GCVE-0-2009-5020)

Vulnerability from cvelistv5 – Published: 2010-12-02 16:00 – Updated: 2024-09-16 18:04
VLAI?
Summary
Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:53.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-02T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5020",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5020",
    "datePublished": "2010-12-02T16:00:00Z",
    "dateReserved": "2010-12-02T00:00:00Z",
    "dateUpdated": "2024-09-16T18:04:20.705Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4367 (GCVE-0-2010-4367)

Vulnerability from cvelistv5 – Published: 2010-12-02 16:00 – Updated: 2024-08-07 03:43
VLAI?
Summary
awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:14.839Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2011:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-23T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDVSA-2011:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4367",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2011:033",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
            },
            {
              "name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html",
              "refsource": "MISC",
              "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4367",
    "datePublished": "2010-12-02T16:00:00",
    "dateReserved": "2010-12-02T00:00:00",
    "dateUpdated": "2024-08-07T03:43:14.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4369 (GCVE-0-2010-4369)

Vulnerability from cvelistv5 – Published: 2010-12-02 16:00 – Updated: 2024-08-07 03:43
VLAI?
Summary
Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2011/0202 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/45210 vdb-entryx_refsource_BID
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.ubuntu.com/usn/USN-1047-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/43004 third-party-advisoryx_refsource_SECUNIA
http://awstats.sourceforge.net/docs/awstats_chang… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:14.651Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2011-0202",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0202"
          },
          {
            "name": "45210",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45210"
          },
          {
            "name": "MDVSA-2011:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
          },
          {
            "name": "USN-1047-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1047-1"
          },
          {
            "name": "43004",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43004"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-10T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2011-0202",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0202"
        },
        {
          "name": "45210",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45210"
        },
        {
          "name": "MDVSA-2011:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
        },
        {
          "name": "USN-1047-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1047-1"
        },
        {
          "name": "43004",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43004"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4369",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2011-0202",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0202"
            },
            {
              "name": "45210",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45210"
            },
            {
              "name": "MDVSA-2011:033",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
            },
            {
              "name": "USN-1047-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1047-1"
            },
            {
              "name": "43004",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43004"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4369",
    "datePublished": "2010-12-02T16:00:00",
    "dateReserved": "2010-12-02T00:00:00",
    "dateUpdated": "2024-08-07T03:43:14.651Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5080 (GCVE-0-2008-5080)

Vulnerability from cvelistv5 – Published: 2008-12-03 18:00 – Updated: 2024-08-07 10:40
VLAI?
Summary
awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:40:16.956Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "33002",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33002"
          },
          {
            "name": "awstats-querystring-xss(47116)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
          },
          {
            "name": "USN-686-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-686-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter.  NOTE: this issue exists because of an incomplete fix for CVE-2008-3714."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "33002",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33002"
        },
        {
          "name": "awstats-querystring-xss(47116)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
        },
        {
          "name": "USN-686-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-686-1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-5080",
    "datePublished": "2008-12-03T18:00:00",
    "dateReserved": "2008-11-14T00:00:00",
    "dateUpdated": "2024-08-07T10:40:16.956Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-46391 (GCVE-0-2022-46391)

Vulnerability from nvd – Published: 2022-12-04 00:00 – Updated: 2025-04-24 15:20
VLAI?
Summary
AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T14:31:46.485Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/eldy/AWStats/pull/226"
          },
          {
            "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3225-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
          },
          {
            "name": "FEDORA-2023-b645c7feda",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
          },
          {
            "name": "FEDORA-2023-fda5480804",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.1,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "LOW",
              "integrityImpact": "LOW",
              "privilegesRequired": "NONE",
              "scope": "CHANGED",
              "userInteraction": "REQUIRED",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-46391",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-24T15:20:05.587410Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-79",
                "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-24T15:20:34.836Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-18T00:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://github.com/eldy/AWStats/pull/226"
        },
        {
          "name": "[debian-lts-announce] 20221205 [SECURITY] [DLA 3225-1] awstats security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00010.html"
        },
        {
          "name": "FEDORA-2023-b645c7feda",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFYH4DE3COMI3LJCOQQXA4FWOABU6Z2/"
        },
        {
          "name": "FEDORA-2023-fda5480804",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MYUZIFVB4N3NK4WGNHRNXZKJITCJBJX4/"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-46391",
    "datePublished": "2022-12-04T00:00:00.000Z",
    "dateReserved": "2022-12-04T00:00:00.000Z",
    "dateUpdated": "2025-04-24T15:20:34.836Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-35176 (GCVE-0-2020-35176)

Vulnerability from nvd – Published: 2020-12-11 23:16 – Updated: 2024-08-04 17:02
VLAI?
Summary
In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T17:02:06.840Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/issues/195"
          },
          {
            "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
          },
          {
            "name": "FEDORA-2020-4cba5f2846",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
          },
          {
            "name": "FEDORA-2020-d1aa0e030c",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-08T04:06:13",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/eldy/awstats/issues/195"
        },
        {
          "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
        },
        {
          "name": "FEDORA-2020-4cba5f2846",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
        },
        {
          "name": "FEDORA-2020-d1aa0e030c",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-35176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/eldy/awstats/issues/195",
              "refsource": "MISC",
              "url": "https://github.com/eldy/awstats/issues/195"
            },
            {
              "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
            },
            {
              "name": "FEDORA-2020-4cba5f2846",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BRHYCKLW5VPM6KP2WZW6DCCVHVBG7YCW/"
            },
            {
              "name": "FEDORA-2020-d1aa0e030c",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-35176",
    "datePublished": "2020-12-11T23:16:22",
    "dateReserved": "2020-12-11T00:00:00",
    "dateUpdated": "2024-08-04T17:02:06.840Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-29600 (GCVE-0-2020-29600)

Vulnerability from nvd – Published: 2020-12-07 19:52 – Updated: 2024-08-04 16:55
VLAI?
Summary
In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T16:55:10.624Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/issues/90"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
          },
          {
            "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
          },
          {
            "name": "FEDORA-2020-d1aa0e030c",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-01-08T04:06:12",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/eldy/awstats/issues/90"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
        },
        {
          "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
        },
        {
          "name": "FEDORA-2020-d1aa0e030c",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-29600",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/eldy/awstats/issues/90",
              "refsource": "MISC",
              "url": "https://github.com/eldy/awstats/issues/90"
            },
            {
              "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469",
              "refsource": "MISC",
              "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469"
            },
            {
              "name": "[debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/12/msg00035.html"
            },
            {
              "name": "FEDORA-2020-d1aa0e030c",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/47QZWKSRZYZFESYTLSW7A6KVKOOPL7IV/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-29600",
    "datePublished": "2020-12-07T19:52:14",
    "dateReserved": "2020-12-07T00:00:00",
    "dateUpdated": "2024-08-04T16:55:10.624Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2018-10245 (GCVE-0-2018-10245)

Vulnerability from nvd – Published: 2018-04-20 17:00 – Updated: 2024-09-16 20:32
VLAI?
Summary
A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T07:32:01.665Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-20T17:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-10245",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/theyiyibest/AWStatsFullPathDisclosure",
              "refsource": "MISC",
              "url": "https://github.com/theyiyibest/AWStatsFullPathDisclosure"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-10245",
    "datePublished": "2018-04-20T17:00:00Z",
    "dateReserved": "2018-04-20T00:00:00Z",
    "dateUpdated": "2024-09-16T20:32:47.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-1000501 (GCVE-0-2017-1000501)

Vulnerability from nvd – Published: 2018-01-03 15:00 – Updated: 2024-08-05 22:00
VLAI?
Summary
Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:00:41.596Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-4092",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2018/dsa-4092"
          },
          {
            "name": "[debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.awstats.org/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
          },
          {
            "name": "GLSA-202007-37",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202007-37"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "dateAssigned": "2017-12-29T00:00:00",
      "datePublic": "2017-12-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the \"config\" and \"migrate\" parameters resulting in unauthenticated remote code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-07-27T02:06:09",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-4092",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2018/dsa-4092"
        },
        {
          "name": "[debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.awstats.org/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
        },
        {
          "name": "GLSA-202007-37",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/202007-37"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "DATE_ASSIGNED": "2017-12-29",
          "ID": "CVE-2017-1000501",
          "REQUESTER": "jd@cpanel.net",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Awstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the \"config\" and \"migrate\" parameters resulting in unauthenticated remote code execution."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-4092",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2018/dsa-4092"
            },
            {
              "name": "[debian-lts-announce] 20180110 [SECURITY] [DLA 1238-1] awstats security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00012.html"
            },
            {
              "name": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651",
              "refsource": "CONFIRM",
              "url": "https://github.com/eldy/awstats/commit/06c0ab29c1e5059d9e0279c6b64d573d619e1651"
            },
            {
              "name": "http://www.awstats.org/",
              "refsource": "MISC",
              "url": "http://www.awstats.org/"
            },
            {
              "name": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899",
              "refsource": "CONFIRM",
              "url": "https://github.com/eldy/awstats/commit/cf219843a74c951bf5986f3a7fffa3dcf99c3899"
            },
            {
              "name": "GLSA-202007-37",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/202007-37"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-1000501",
    "datePublished": "2018-01-03T15:00:00",
    "dateReserved": "2018-01-03T00:00:00",
    "dateUpdated": "2024-08-05T22:00:41.596Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4368 (GCVE-0-2010-4368)

Vulnerability from nvd – Published: 2010-12-02 16:00 – Updated: 2024-09-16 19:39
VLAI?
Summary
awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:14.765Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "VU#870532",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/870532"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-02T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "VU#870532",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/870532"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4368",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "VU#870532",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/870532"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "MISC",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            },
            {
              "name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html",
              "refsource": "MISC",
              "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4368",
    "datePublished": "2010-12-02T16:00:00Z",
    "dateReserved": "2010-12-02T00:00:00Z",
    "dateUpdated": "2024-09-16T19:39:59.178Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-5020 (GCVE-0-2009-5020)

Vulnerability from nvd – Published: 2010-12-02 16:00 – Updated: 2024-09-16 18:04
VLAI?
Summary
Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:24:53.993Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-02T16:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-5020",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Open redirect vulnerability in awredir.pl in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-5020",
    "datePublished": "2010-12-02T16:00:00Z",
    "dateReserved": "2010-12-02T00:00:00Z",
    "dateUpdated": "2024-09-16T18:04:20.705Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4367 (GCVE-0-2010-4367)

Vulnerability from nvd – Published: 2010-12-02 16:00 – Updated: 2024-08-07 03:43
VLAI?
Summary
awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:14.839Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2011:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-02-23T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDVSA-2011:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4367",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2011:033",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
            },
            {
              "name": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html",
              "refsource": "MISC",
              "url": "http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4367",
    "datePublished": "2010-12-02T16:00:00",
    "dateReserved": "2010-12-02T00:00:00",
    "dateUpdated": "2024-08-07T03:43:14.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-4369 (GCVE-0-2010-4369)

Vulnerability from nvd – Published: 2010-12-02 16:00 – Updated: 2024-08-07 03:43
VLAI?
Summary
Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2011/0202 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/bid/45210 vdb-entryx_refsource_BID
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.ubuntu.com/usn/USN-1047-1 vendor-advisoryx_refsource_UBUNTU
http://secunia.com/advisories/43004 third-party-advisoryx_refsource_SECUNIA
http://awstats.sourceforge.net/docs/awstats_chang… x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T03:43:14.651Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2011-0202",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0202"
          },
          {
            "name": "45210",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/45210"
          },
          {
            "name": "MDVSA-2011:033",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
          },
          {
            "name": "USN-1047-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1047-1"
          },
          {
            "name": "43004",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43004"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-12-10T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2011-0202",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0202"
        },
        {
          "name": "45210",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/45210"
        },
        {
          "name": "MDVSA-2011:033",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
        },
        {
          "name": "USN-1047-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1047-1"
        },
        {
          "name": "43004",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43004"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-4369",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2011-0202",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0202"
            },
            {
              "name": "45210",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/45210"
            },
            {
              "name": "MDVSA-2011:033",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:033"
            },
            {
              "name": "USN-1047-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1047-1"
            },
            {
              "name": "43004",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43004"
            },
            {
              "name": "http://awstats.sourceforge.net/docs/awstats_changelog.txt",
              "refsource": "CONFIRM",
              "url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-4369",
    "datePublished": "2010-12-02T16:00:00",
    "dateReserved": "2010-12-02T00:00:00",
    "dateUpdated": "2024-08-07T03:43:14.651Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-5080 (GCVE-0-2008-5080)

Vulnerability from nvd – Published: 2008-12-03 18:00 – Updated: 2024-08-07 10:40
VLAI?
Summary
awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:40:16.956Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "33002",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33002"
          },
          {
            "name": "awstats-querystring-xss(47116)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
          },
          {
            "name": "USN-686-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/usn-686-1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "awstats.pl in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter.  NOTE: this issue exists because of an incomplete fix for CVE-2008-3714."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "33002",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33002"
        },
        {
          "name": "awstats-querystring-xss(47116)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47116"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474396"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=495432#21"
        },
        {
          "name": "USN-686-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/usn-686-1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2008-5080",
    "datePublished": "2008-12-03T18:00:00",
    "dateReserved": "2008-11-14T00:00:00",
    "dateUpdated": "2024-08-07T10:40:16.956Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}