

- #Awstats awstats pl configdir how to#
- #Awstats awstats pl configdir install#
- #Awstats awstats pl configdir upgrade#
- #Awstats awstats pl configdir software#
- #Awstats awstats pl configdir code#
When '' is run as a CGI script, it fails to validate specific "The remote host is affected by the vulnerability described in GLSA-200501-36 "The remote Gentoo host is missing one or more security-related Script_summary(english:"Checks for updated package(s) in /var/db/pkg")
#Awstats awstats pl configdir code#
Script_name(english:"GLSA-200501-36 : AWStats: Remote code execution") Script_set_attribute(attribute:"plugin_modification_date", value:"6") # and licensed under the Creative Commons - Attribution / Share Alike # The advisory text is Copyright (C) 2001-2018 Gentoo Foundation, Inc. # extracted from Gentoo Linux Security Advisory GLSA 200501-36. # The descriptive text and package checks in this plugin were This script is Copyright (C) 2005-2021 and is owned by Tenable, Inc. This is the gentoo_GLSA-200501-36.nasl nessus plugin source code. Risk InformationĬVSS V2 Vector : AV:N/AC:L/Au:N/C:P/I:P/A:P CVSS Base Score:
#Awstats awstats pl configdir how to#
For more information, see how to use exploits safely. These exploits and PoCs could contain malware. WARNING: Beware of using unverified exploits from sources such as GitHub or Exploit-DB. In any other case, this would be considered as an illegal activity.

#Awstats awstats pl configdir upgrade#
Making sure that AWStats does not run as a CGI script will avoid the issue, but we recommend that users upgrade to the latest version, which fixes these bugs.Īll AWStats users should upgrade to the latest version:

Furthermore, a user could read log file content even when plugin rawlog was not enabled.Ī remote attacker could supply AWStats malicious input, potentially allowing the execution of arbitrary code with the rights of the web server. When '' is run as a CGI script, it fails to validate specific inputs which are used in a Perl open() function call. The remote host is affected by the vulnerability described in GLSA-200501-36 (AWStats: Remote code execution) The remote Gentoo host is missing one or more security-related patches. Required KB Items : Host/Gentoo/qpkg-list, Host/Gentoo/release, Host/local_checks_enabledĬVE : CVE-2005-0116, CVE-2005-0362, CVE-2005-0363ĬPE : cpe:/o:gentoo:linux, p-cpe:/a:gentoo:linux:awstats Plugin Family: Gentoo Local Security Checks Name: GLSA-200501-36 : AWStats: Remote code execution
#Awstats awstats pl configdir software#
#Awstats awstats pl configdir install#
Install Nessus and Plugins Offline (with pictures).Detailed Overview of Nessus Professional.CMS Vulnerability Scanners for WordPress, Joomla, Drupal, Moodle, Typo3.Top 20 Microsoft Azure Vulnerabilities and Misconfigurations.
