Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2010-4367 — Code Injection in Awstats
Severity
7.5HIGHNVD
EPSS
7.3%
top 8.34%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 2
Latest updateMay 17
Description
awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, which allows remote attackers to execute arbitrary commands via a crafted configuration file located on a (1) WebDAV server or (2) NFS server.
CVSS vector
AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4
Affected Packages3 packages
🔴Vulnerability Details
2💥Exploits & PoCs
1🔍Detection Rules
1Suricata▶
ET WEB_SPECIFIC_APPS Awstats Apache Tomcat Configuration File Remote Arbitrary Command Execution Attempt↗2011-03-01
📋Vendor Advisories
1Debian▶
CVE-2010-4367: awstats - awstats.cgi in AWStats before 7.0 accepts a configdir parameter in the URL, whic...↗2010
💬Community
1Bugzilla
▶