Summary
The remote host seems to be running AWStats, a free real-time logfile analyzer.
AWStats Rawlog Plugin is reported prone to an input validation vulnerability. The issue is reported to exist because user supplied 'logfile' URI data passed to the 'awstats.pl' script is not sanitized.
An attacker may exploit this condition to execute commands remotely or disclose contents of web server readable files.
Solution
Upgrade to the latest version of this software
Severity
Classification
-
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apache Web Server Linefeed Memory Allocation Denial Of Service Vulnerability
- Apache ActiveMQ Source Code Information Disclosure Vulnerability
- 1024 CMS 1.1.0 Beta 'force_download.php' Local File Include Vulnerability
- Apache Archiva Home Page Cross-Site Scripting vulnerability
- Apache Tomcat source.jsp malformed request information disclosure