Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 759544 (CVE-2020-35176)

Summary: www-misc/awstats: Arbitrary code execution (CVE-2020-35176)
Product: Gentoo Security Reporter: Sam James <sam>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: IN_PROGRESS ---    
Severity: major CC: web-apps
Priority: Normal Keywords: PullRequest
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://github.com/eldy/awstats/issues/195
See Also: https://bugs.gentoo.org/show_bug.cgi?id=646786
https://github.com/gentoo/gentoo/pull/23754
Whiteboard: B2 [upstream/ebuild]
Package list:
Runtime testing required: ---

Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-12-12 03:27:36 UTC
"In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600."
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-12-16 08:46:16 UTC Comment hidden (obsolete)
Comment 2 NATTkA bot gentoo-dev Security 2021-07-29 17:25:09 UTC Comment hidden (obsolete)
Comment 3 NATTkA bot gentoo-dev Security 2021-07-29 17:33:42 UTC Comment hidden (obsolete)
Comment 4 NATTkA bot gentoo-dev Security 2021-07-29 17:41:35 UTC Comment hidden (obsolete)
Comment 5 NATTkA bot gentoo-dev Security 2021-07-29 17:49:44 UTC Comment hidden (obsolete)
Comment 6 NATTkA bot gentoo-dev Security 2021-07-29 18:05:38 UTC Comment hidden (obsolete)
Comment 7 NATTkA bot gentoo-dev Security 2021-07-29 18:13:57 UTC
Package list is empty or all packages have requested keywords.
Comment 9 John Helmert III archtester Gentoo Infrastructure gentoo-dev Security 2022-08-16 22:38:15 UTC
Hm, this doesn't quite seem like arbitrary code execution on its own, since this may execute code via path traversal.