Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.osvdb.org/18696 | vdb entry patch broken link |
https://usn.ubuntu.com/167-1/ | vendor advisory broken link |
http://www.securiteam.com/unixfocus/5DP0J00GKE.html | broken link vendor advisory |
http://www.novell.com/linux/security/advisories/2005_19_sr.html | vendor advisory broken link |
http://www.debian.org/security/2005/dsa-892 | mailing list third party advisory vendor advisory |
http://secunia.com/advisories/17463 | third party advisory broken link |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21769 | vdb entry third party advisory |
http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false | third party advisory broken link |
http://secunia.com/advisories/16412 | broken link third party advisory patch vendor advisory |
http://securitytracker.com/id?1014636 | patch vdb entry third party advisory broken link |
http://www.securityfocus.com/bid/14525 | vdb entry third party advisory broken link |