CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
91.3%
AWStats is prone to a path-disclosure vulnerability.
# SPDX-FileCopyrightText: 2009 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:awstats:awstats";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.100070");
script_version("2023-07-27T05:05:08+0000");
script_tag(name:"last_modification", value:"2023-07-27 05:05:08 +0000 (Thu, 27 Jul 2023)");
script_tag(name:"creation_date", value:"2009-03-22 17:08:49 +0100 (Sun, 22 Mar 2009)");
script_cve_id("CVE-2006-3682");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:N/A:N");
script_name("AWStats 'awstats.pl' Multiple Path Disclosure Vulnerability");
script_category(ACT_GATHER_INFO);
script_family("Web application abuses");
script_copyright("Copyright (C) 2009 Greenbone AG");
script_dependencies("awstats_detect.nasl");
script_mandatory_keys("awstats/installed");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/34159");
script_tag(name:"summary", value:"AWStats is prone to a path-disclosure vulnerability.");
script_tag(name:"affected", value:"AWStats 6.5 (build 1.857) and prior WebGUI Runtime Environment 0.8.x and
prior");
script_tag(name:"impact", value:"Exploiting this issue can allow an attacker to access sensitive data that may
be used to launch further attacks against a vulnerable computer.");
script_tag(name:"solution", value:"Please update to AWStats 6.6 or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"remote_app");
exit(0);
}
include("host_details.inc");
include("http_func.inc");
include("http_keepalive.inc");
if (!port = get_app_port(cpe: CPE))
exit(0);
if (!dir = get_app_location(cpe: CPE, port: port))
exit(0);
if (dir == "/")
dir = "";
url = dir + "/awstats.pl?config=VT-Test";
if (http_vuln_check(port: port, url: url,
pattern: 'Error:.*config file "awstats.VT-Test.conf".*after searching in path.*')) {
report = http_report_vuln_url(port: port, url: url);
security_message(port: port, data: report);
exit(0);
}
exit(99);