USN-360-1: awstats vulnerabilities

Publication date

10 October 2006

Overview

awstats vulnerabilities


Details

awstats did not fully sanitize input, which was passed directly to the user’s
browser, allowing for an XSS attack. If a user was tricked into following a
specially crafted awstats URL, the user’s authentication information could be
exposed for the domain where awstats was hosted. (CVE-2006-3681)

awstats could display its installation path under certain conditions.
However, this might only become a concern if awstats is installed into
an user’s home directory. (CVE-2006-3682)

awstats did not fully sanitize input, which was passed directly to the user’s
browser, allowing for an XSS attack. If a user was tricked into following a
specially crafted awstats URL, the user’s authentication information could be
exposed for the domain where awstats was hosted. (CVE-2006-3681)

awstats could display its installation path under certain conditions.
However, this might only become a concern if awstats is installed into
an user’s home directory. (CVE-2006-3682)

Update instructions

In general, a standard system upgrade is sufficient to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
6.06 dapper awstats –  6.5-1ubuntu1.2
5.10 breezy awstats –  6.4-1ubuntu1.3
5.04 hoary awstats –  6.3-1ubuntu0.4

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›