Severity
5.0MEDIUMNVD
EPSS
1.3%
top 20.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 15
Latest updateMay 1

Description

Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.

CVSS vector

AV:N/AC:L/C:N/I:P/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages3 packages

debiandebian/awstats< awstats 6.4-1.1 (bookworm)
Debianawstats/awstats< 6.4-1.1+3

Also affects: Debian Linux 3.0, 3.1, Ubuntu Linux 5.04

Patches

🔴Vulnerability Details

2
GHSA
GHSA-7rg7-c2wp-3xxr: Eval injection vulnerability in awstats2022-05-01
OSV
CVE-2005-1527: Eval injection vulnerability in awstats2005-08-15

📋Vendor Advisories

2
Ubuntu
AWStats vulnerability2005-08-12
Debian
CVE-2005-1527: awstats - Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a UR...2005

📐Framework References

3
CWE
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
CWE
Improper Control of Generation of Code ('Code Injection')
CWE
Cleartext Storage of Sensitive Information in Executable
CVE-2005-1527 — Code Injection in Debian Awstats | cvebase