HTTP: Awstats Apache Tomcat Configuration File Command Execution

This signature detects attempts to exploit a known vulnerability against Awstats Apache Tomcat Configuration File loader. A successful attack can lead to arbitrary code execution.

Extended Description

Awstats is prone to an arbitrary command-execution vulnerability. This issue occurs when Awstats is used along with Apache Tomcat in Microsoft Windows. An attacker can exploit this vulnerability to execute arbitrary shell commands in the context of the webserver process. This may help attackers compromise the underlying system; other attacks are also possible. AWStats 6.95 and prior versions are vulnerable.

Affected Products

Awstats awstats

Short Name
HTTP:TOMCAT:AWSTATS-CFG-EXEC
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Apache Awstats CVE-2010-4367 CVE-2010-4368 Command Configuration Execution File Tomcat bid:45123
Release Date
01/06/2011
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Mandriva

Awstats

CVSS Score

7.5

Found a potential security threat?