[manjaro-security] [ASA-202103-15] awstats: directory traversal

Morten Linderud via arch-security arch-security at lists.archlinux.org
Fri Mar 26 21:12:37 CET 2021


Arch Linux Security Advisory ASA-202103-15
==========================================

Severity: High
Date    : 2021-03-25
CVE-ID  : CVE-2020-35176
Package : awstats
Type    : directory traversal
Remote  : Yes
Link    : https://security.archlinux.org/AVG-1356

Summary
=======

The package awstats before version 7.8-3 is vulnerable to directory
traversal.

Resolution
==========

Upgrade to 7.8-3.

# pacman -Syu "awstats>=7.8-3"

The problem has been fixed upstream but no release is available yet.

Workaround
==========

None.

Description
===========

In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial
absolute pathname (omitting the initial /etc), even though it was
intended to only read a file in the /etc/awstats/awstats.conf format.
This issue exists because of an incomplete fix for CVE-2017-1000501 and
CVE-2020-29600.

Impact
======

A malicious user could access files on the filesystem.

References
==========

https://bugs.archlinux.org/task/69301
https://github.com/eldy/awstats/issues/195
https://github.com/eldy/awstats/pull/196
https://github.com/eldy/AWStats/commit/0d4d4c05f8e73be8f71dd361dc55cbd52858b823
https://security.archlinux.org/CVE-2020-35176
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: not available
URL: <http://lists.manjaro.org/pipermail/manjaro-security/attachments/20210326/f2f20e7c/attachment.sig>


More information about the manjaro-security mailing list