CERTA-2005-AVI-307
Vulnerability from certfr_avis - Published: 2005-08-10 - Updated: 2005-11-10None
Description
AWStats est un outil d'analyse de fichiers de journalisation et de
génération de statistiques pour les serveurs web, FTP ou mail.
Une vérification insuffisante de la validité du champ referrer présent
dans des requêtes http permet à un utilisateur distant mal intentionné,
par le biais d'une requête http malicieusement construite enregistrée
dans les fichiers de journalisation du serveur web, d'exécuter du code
arbitraire sur le système effectuant l'analyse de ces même fichiers.
Solution
La version 6.4 de AWStats corrige le problème et est disponible à l'adresse :
http://awstats.sourceforge.net/#DOWNLOAD
AWStats versions 6.3 et antérieures.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cTT\u003eAWStats\u003c/TT\u003e versions 6.3 et ant\u00e9rieures.",
"content": "## Description\n\nAWStats est un outil d\u0027analyse de fichiers de journalisation et de\ng\u00e9n\u00e9ration de statistiques pour les serveurs web, FTP ou mail. \nUne v\u00e9rification insuffisante de la validit\u00e9 du champ referrer pr\u00e9sent\ndans des requ\u00eates http permet \u00e0 un utilisateur distant mal intentionn\u00e9,\npar le biais d\u0027une requ\u00eate http malicieusement construite enregistr\u00e9e\ndans les fichiers de journalisation du serveur web, d\u0027ex\u00e9cuter du code\narbitraire sur le syst\u00e8me effectuant l\u0027analyse de ces m\u00eame fichiers.\n\n## Solution\n\nLa version 6.4 de AWStats corrige le probl\u00e8me et est disponible \u00e0\nl\u0027adresse :\n\n http://awstats.sourceforge.net/#DOWNLOAD\n",
"cves": [],
"initial_release_date": "2005-08-10T00:00:00",
"last_revision_date": "2005-11-10T00:00:00",
"links": [
{
"title": "Site de AWStats :",
"url": "http://awstats.sourceforge.net/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 SuSE du 19 ao\u00fbt 2005 :",
"url": "http://www.novell.com/linux/security/advisories/2005_19_sr.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200508-07 du 16 ao\u00fbt 2005 :",
"url": "http://security.gentoo.org/glsa/glsa-200508-07.xml"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Debian dsa-892 du 10 novembre 2005 :",
"url": "http://www.debian.org/security/2005/dsa-892"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 FreeBSD :",
"url": "http://www.vuxml.org/freebsd/pkg-awstats.html"
}
],
"reference": "CERTA-2005-AVI-307",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2005-08-10T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 FreeBSD.",
"revision_date": "2005-08-18T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Gentoo et SuSE.",
"revision_date": "2005-08-31T00:00:00.000000"
},
{
"description": "ajout du bulletin de s\u00e9curit\u00e9 Debian.",
"revision_date": "2005-11-10T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 de AWStats",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 iDEFENSE 08.09.05",
"url": "http://www.idefense.com/application/poi/display?id=290\u0026type=vulnerabilities"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…