CERTA-2005-AVI-035
Vulnerability from certfr_avis - Published: - Updated:
Description
AWStats est un outil d'analyse de fichiers journaux et de génération de
statistiques pour les serveurs web, FTP ou mail.
Une vulnérabilité dans la validation des paramètres passés au script
awstats.pl permet à un utilisateur mal intentionné d'exécuter du code
arbitraire à distance avec les droits du serveur web.
Solution
Mettre à jour AWStats en version de développement 6.3 ou désactiver l'utilisation de AWStats en attendant la prochaine version stable 6.3 (cf. section Documentation).
Impacted products
References
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Toutes les versions de AWStats ant\u00e9rieures \u00e0 la version 6.3.",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Description\n\nAWStats est un outil d\u0027analyse de fichiers journaux et de g\u00e9n\u00e9ration de\nstatistiques pour les serveurs web, FTP ou mail. \nUne vuln\u00e9rabilit\u00e9 dans la validation des param\u00e8tres pass\u00e9s au script\nawstats.pl permet \u00e0 un utilisateur mal intentionn\u00e9 d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance avec les droits du serveur web.\n\n## Solution\n\nMettre \u00e0 jour AWStats en version de d\u00e9veloppement 6.3 ou d\u00e9sactiver\nl\u0027utilisation de AWStats en attendant la prochaine version stable 6.3\n(cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2005-0116",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0116"
},
{
"name": "CVE-2005-0363",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0363"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA 200501-36 du 25 janvier 2005 :",
"url": "http://www.gentoo.org/security/en/glsa/glsa-200501-36.xml"
},
{
"title": "Mise \u00e0 jour de s\u00e9curit\u00e9 du paquetage NetBSD awstats :",
"url": "ftp://ftp.netbsd.org/pub/NetBSD/packages/pkgsrc/www/awstats/README.html"
},
{
"title": "Fichier de la liste des changements de AWStats :",
"url": "http://awstats.sourceforge.net/docs/awstats_changelog.txt"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-682 du 15 f\u00e9vrier 2005 :",
"url": "http://www.debian.org/security/2005/dsa-682"
},
{
"title": "Site Internet de AWStats :",
"url": "http://awstats.sourceforge.net"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD pour awstats du 16 f\u00e9vrier 2005 :",
"url": "http://www.vuxml.org/freebsd/"
}
],
"reference": "CERTA-2005-AVI-035",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-01-27T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 NetBSD.",
"revision_date": "2005-02-15T00:00:00.000000"
},
{
"description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 FreeBSD.",
"revision_date": "2005-02-18T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "",
"title": "Vuln\u00e9rabilit\u00e9 de AWStats",
"vendor_advisories": [
{
"published_at": "2005-01-17",
"title": "Bulletin de s\u00e9curit\u00e9 iDEFENSE",
"url": "http://www.idefense.com/application/poi/display?id=185\u0026type=vulnerabilities"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…