Directory traversal vulnerability in AWStats before 7.0 allows remote attackers to have an unspecified impact via a crafted LoadPlugin directory.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.vupen.com/english/advisories/2011/0202 | vdb entry |
http://www.securityfocus.com/bid/45210 | vdb entry |
http://www.mandriva.com/security/advisories?name=MDVSA-2011:033 | vendor advisory |
http://www.ubuntu.com/usn/USN-1047-1 | vendor advisory |
http://secunia.com/advisories/43004 | third party advisory |
http://awstats.sourceforge.net/docs/awstats_changelog.txt |