dialzuloo.blogg.se

Awstats pl configdir
Awstats pl configdir






awstats pl configdir
  1. AWSTATS PL CONFIGDIR UPDATE
  2. AWSTATS PL CONFIGDIR UPGRADE
  3. AWSTATS PL CONFIGDIR FULL
  4. AWSTATS PL CONFIGDIR SOFTWARE

My awstats configuration is: LogFile="/usr/share/awstats/tools/ /var/log/httpd/-sslaccess.log /var/log/httpd/-access.log |" The problem might be caused by the logresolvemerge tool (I have seperate logs for regular and SSL traffic). I assume it is a problem with log rotation but it's hard to tell. To be clear the data was being shown for these days up until the end of the month but then on the next month (not always on the 1st) about 1-2 weeks of data suddenly goes missing from the previous month.

AWSTATS PL CONFIGDIR UPGRADE

Solution Upgrade to AWStats version 6.3 or later. An attacker may exploit this condition to execute commands remotely or disclose contents of files, subject to the privileges under which the web server operates.

AWSTATS PL CONFIGDIR SOFTWARE

In AWStats through 7.8, cgi-bin/?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/nf format.I am seeing a problem on my server where awstats is deleting data from previous days. The remote version of this software fails to sanitize user-supplied input to the 'configdir' parameter of the '' script. Usage: now options Where options are: -awstatsprogpathtoawstatspl -configdir. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600. The scanned directory is by default /etc/awstats. If you use a common log, will suggest changing it to the NCSA combined/XLF/ELF format (you can use your own custom log format but this predefined log format is often the best choice and makes setup easier). The remote version of this software fails to sanitize user-supplied input to the 'configdir' parameter of the '' script. iDEFENSE has confirmed that AWStats versions 6.1 and 6.2 are. The remote host is running AWStats, a free logfile analysis tool for analyzing ftp, mail, web. In AWStats through 7.7, cgi-bin/?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/nf format. This module exploits an arbitrary command execution vulnerability in the AWStats CGI script. /usr/bin/ now -confdir'/usr/local/psa/etc' -awstatsprog'/var/path) If it works, then run the Plesk program that generates statistics, to make sure that everything is fine: /usr/local/psa/admin/sbin/statistics Debug as needed in this step. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.Īwstats version 7.6 and earlier is vulnerable to a path traversal flaw in the handling of the "config" and "migrate" parameters resulting in unauthenticated remote code execution.ĪWStats 6.5, and possibly other versions, allows remote authenticated users to execute arbitrary code by using the configdir parameter to to upload a configuration file whose name contains shell metacharacters, then access that file using the LogFile directive.

awstats pl configdir awstats pl configdir

AWSTATS PL CONFIGDIR FULL

The web interface for AWStats 6.4 and 6.5, when statistics updates are enabled, allows remote attackers to execute arbitrary code via shell metacharacters in the migrate parameter.Įval injection vulnerability in in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.Ī Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682.

AWSTATS PL CONFIGDIR UPDATE

The attack can, for example, use the framename and update parameters.Ī in AWStats 6.8 and earlier does not properly remove quote characters, which allows remote attackers to conduct cross-site scripting (XSS) attacks via the query_string parameter. NOTE: this issue exists because of an incomplete fix for CVE-2008-3714.Ĭross-site scripting (XSS) vulnerability in in AWStats 6.8 allows remote attackers to inject arbitrary web script or HTML via the query_string, a different vulnerability than CVE-2006-3681 and CVE-2006-1945.








Awstats pl configdir