Details
awstats did not fully sanitize input, which was passed directly to the user’s
browser, allowing for an XSS attack. If a user was tricked into following a
specially crafted awstats URL, the user’s authentication information could be
exposed for the domain where awstats was hosted. (CVE-2006-3681)
awstats could display its installation path under certain conditions.
However, this might only become a concern if awstats is installed into
an user’s home directory. (CVE-2006-3682)
awstats did not fully sanitize input, which was passed directly to the user’s
browser, allowing for an XSS attack. If a user was tricked into following a
specially crafted awstats URL, the user’s authentication information could be
exposed for the domain where awstats was hosted. (CVE-2006-3681)
awstats could display its installation path under certain conditions.
However, this might only become a concern if awstats is installed into
an user’s home directory. (CVE-2006-3682)
Update instructions
In general, a standard system upgrade is sufficient to effect the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
6.06 dapper | awstats – 6.5-1ubuntu1.2 | ||
5.10 breezy | awstats – 6.4-1ubuntu1.3 | ||
5.04 hoary | awstats – 6.3-1ubuntu0.4 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.