[manjaro-security] [ASA-202103-15] awstats: directory traversal
Morten Linderud via arch-security
arch-security at lists.archlinux.org
Fri Mar 26 21:12:37 CET 2021
Arch Linux Security Advisory ASA-202103-15
==========================================
Severity: High
Date : 2021-03-25
CVE-ID : CVE-2020-35176
Package : awstats
Type : directory traversal
Remote : Yes
Link : https://security.archlinux.org/AVG-1356
Summary
=======
The package awstats before version 7.8-3 is vulnerable to directory
traversal.
Resolution
==========
Upgrade to 7.8-3.
# pacman -Syu "awstats>=7.8-3"
The problem has been fixed upstream but no release is available yet.
Workaround
==========
None.
Description
===========
In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial
absolute pathname (omitting the initial /etc), even though it was
intended to only read a file in the /etc/awstats/awstats.conf format.
This issue exists because of an incomplete fix for CVE-2017-1000501 and
CVE-2020-29600.
Impact
======
A malicious user could access files on the filesystem.
References
==========
https://bugs.archlinux.org/task/69301
https://github.com/eldy/awstats/issues/195
https://github.com/eldy/awstats/pull/196
https://github.com/eldy/AWStats/commit/0d4d4c05f8e73be8f71dd361dc55cbd52858b823
https://security.archlinux.org/CVE-2020-35176
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20210326/f2f20e7c/attachment.sig>
More information about the manjaro-security
mailing list