Gentoo Archives: gentoo-announce

From: Sune Kloppenborg Jeppesen <jaervosz@g.o>
To: gentoo-announce@l.g.o
Cc: bugtraq@×××××××××××××.com, full-disclosure@××××××××××××××.uk, security-alerts@×××××××××××××.com
Subject: [gentoo-announce] [ GLSA 200606-06 ] AWStats: Remote execution of arbitrary code
Date: Wed, 07 Jun 2006 19:33:54
Message-Id: 200606072059.11420.jaervosz@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 200606-06
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: High
8 Title: AWStats: Remote execution of arbitrary code
9 Date: June 07, 2006
10 Bugs: #130487
11 ID: 200606-06
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 AWStats contains a bug in the sanitization of the input parameters
19 which can lead to the remote execution of arbitrary code.
20
21 Background
22 ==========
23
24 AWStats is an advanced log file analyzer and statistics generator.
25
26 Affected packages
27 =================
28
29 -------------------------------------------------------------------
30 Package / Vulnerable / Unaffected
31 -------------------------------------------------------------------
32 1 net-www/awstats < 6.5-r1 >= 6.5-r1
33
34 Description
35 ===========
36
37 Hendrik Weimer has found that if updating the statistics via the web
38 frontend is enabled, it is possible to inject arbitrary code via a pipe
39 character in the "migrate" parameter. Additionally, r0t has discovered
40 that AWStats fails to properly sanitize user-supplied input in
41 awstats.pl.
42
43 Impact
44 ======
45
46 A remote attacker can execute arbitrary code on the server in the
47 context of the application running the AWStats CGI script if updating
48 of the statistics via web frontend is allowed. Nonetheless, all
49 configurations are affected by a cross-site scripting vulnerability in
50 awstats.pl, allowing a remote attacker to execute arbitrary scripts
51 running in the context of the victim's browser.
52
53 Workaround
54 ==========
55
56 Disable statistics updates using the web frontend to avoid code
57 injection. However, there is no known workaround at this time
58 concerning the cross-site scripting vulnerability.
59
60 Resolution
61 ==========
62
63 All AWStats users should upgrade to the latest version:
64
65 # emerge --sync
66 # emerge --ask --oneshot --verbose ">=net-www/awstats-6.5-r1"
67
68 References
69 ==========
70
71 [ 1 ] CVE-2006-1945
72 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1945
73 [ 2 ] CVE-2006-2237
74 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-2237
75
76 Availability
77 ============
78
79 This GLSA and any updates to it are available for viewing at
80 the Gentoo Security Website:
81
82 http://security.gentoo.org/glsa/glsa-200606-06.xml
83
84 Concerns?
85 =========
86
87 Security is a primary focus of Gentoo Linux and ensuring the
88 confidentiality and security of our users machines is of utmost
89 importance to us. Any security concerns should be addressed to
90 security@g.o or alternatively, you may file a bug at
91 http://bugs.gentoo.org.
92
93 License
94 =======
95
96 Copyright 2006 Gentoo Foundation, Inc; referenced text
97 belongs to its owner(s).
98
99 The contents of this document are licensed under the
100 Creative Commons - Attribution / Share Alike license.
101
102 http://creativecommons.org/licenses/by-sa/2.5