CVE-2005-1527
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
15/08/2005
Last modified:
03/04/2025
Description
Eval injection vulnerability in awstats.pl in AWStats 6.4 and earlier, when a URLPlugin is enabled, allows remote attackers to execute arbitrary Perl code via the HTTP Referrer, which is used in a $url parameter that is inserted into an eval function call.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:awstats:awstats:*:*:*:*:*:*:*:* | 6.4 (including) | |
cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://secunia.com/advisories/16412
- http://secunia.com/advisories/17463
- http://securitytracker.com/id?1014636=
- http://www.debian.org/security/2005/dsa-892
- http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false
- http://www.novell.com/linux/security/advisories/2005_19_sr.html
- http://www.osvdb.org/18696
- http://www.securiteam.com/unixfocus/5DP0J00GKE.html
- http://www.securityfocus.com/bid/14525
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21769
- https://usn.ubuntu.com/167-1/
- http://secunia.com/advisories/16412
- http://secunia.com/advisories/17463
- http://securitytracker.com/id?1014636=
- http://www.debian.org/security/2005/dsa-892
- http://www.idefense.com/application/poi/display?id=290&type=vulnerabilities&flashstatus=false
- http://www.novell.com/linux/security/advisories/2005_19_sr.html
- http://www.osvdb.org/18696
- http://www.securiteam.com/unixfocus/5DP0J00GKE.html
- http://www.securityfocus.com/bid/14525
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21769
- https://usn.ubuntu.com/167-1/