refaimg.blogg.se

Cgi bin awstats pl config
Cgi bin awstats pl config




cgi bin awstats pl config
  1. Cgi bin awstats pl config update#
  2. Cgi bin awstats pl config full#
  3. Cgi bin awstats pl config code#

Cgi bin awstats pl config code#

NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.Īwstatstotals.php in AWStats Totals 1.0 through 1.14 allows remote attackers to execute arbitrary code via PHP sequences in the sort parameter, which is used by the multisort function when dynamically creating an anonymous PHP function. Open redirect vulnerability in in AWStats before 6.95 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors.Ī in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. Unspecified vulnerability in in AWStats before 7.1 has unknown impact and attack vectors.ĭirectory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.Īwstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.Īwstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.

cgi bin awstats pl config

Cgi bin awstats pl config update#

The attack can, for example, use the framename and update parameters.Īwstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.

Cgi bin awstats pl config full#

NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.ĬPanel before 70.0.23 allows demo accounts to execute code via awstats (SEC-362).Ī Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. In AWStats through 7.7, cgi-bin/?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/nf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600. Not required (Authentication is not required to exploit the vulnerability.In AWStats through 7.8, cgi-bin/?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/nf format. Very little knowledge or skill is required to exploit. Low (Specialized access conditions or extenuating circumstances do not exist. None (There is no impact to the availability of the system.) None (There is no impact to the integrity of the system) Partial (There is considerable informational disclosure.)






Cgi bin awstats pl config