Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2018-10245 — Sensitive Information Exposure in Awstats
Severity
5.3MEDIUMNVD
CNA5.0OSV5.0
EPSS
0.1%
top 75.00%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 20
Latest updateMay 14
Description
A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4
Affected Packages1 packages
🔴Vulnerability Details
3💥Exploits & PoCs
1Nuclei▶
AWStats <= 7.5 - Full Path Disclosure
📋Vendor Advisories
1Debian▶
CVE-2018-10245: awstats - A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attack...↗2018
💬Community
3Bugzilla▶
CVE-2018-10245 awstats: Full path disclosure vulnerability allows attackers to disclose location of config file [fedora-all]↗2018-04-26
Bugzilla▶
CVE-2018-10245 awstats: Full path disclosure vulnerability allows attackers to disclose location of config file [epel-all]↗2018-04-26
Bugzilla▶
CVE-2018-10245 awstats: Full path disclosure vulnerability allows attackers to disclose location of config file↗2018-04-26