awstats.cgi in AWStats before 7.0 on Windows accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located at a UNC share pathname.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
http://www.kb.cert.org/vuls/id/870532 | third party advisory us government resource |
http://awstats.sourceforge.net/docs/awstats_changelog.txt | |
http://www.exploitdevelopment.com/Vulnerabilities/2010-WEB-001.html | exploit |