Re: chkrootkit has me worried!
Quoting Geoff Crompton (geoff.crompton@strategicdata.com.au):
> The most recent vulnerability that I was aware of in Awstats can still
> work even in static mode. http://www.securityfocus.com/bid/14525. The
> referrer in the log file is not sanity checked.
Hmm.  I note:  "It should be noted this vulnerability is only possible
if the affected application has at least one URLPlugin enabled."
The iDefense advisory casts light on the problem Perl snippet:
   the $url parameter contains unfiltered user-supplied
   data that is used in a call to the Perl routine eval() on lines 4841
   and 4842 of awstats.pl (version 6.4):
   my $function="ShowInfoURL_$pluginname('$url')";
   eval("$function");
   The malicious referrer value will be included in the referrer
   statistics portion of the AWStats report after AWStats has been run
   to generate a new report including the tainted data. Once a user
   visits the referrer statistics page, the injected perl code will
   execute with permissions of the web service.
Unsafe data passed to eval().  Sheesh!
> I would agree with that idea. In fact, I've just lodged a bug report
> along those lines. Bug #341308.
Thank you, Geoff!
Reply to: