A1Stats does not properly validate user input, allowing directory traversal and overwriting of files.
A1Stats is a CGI script that provides reports on web site traffic. A1Stats does not properly filter the CGI query string. An attacker may exploit this vulnerability to traverse directories on the web server or to overwrite arbitrary files to which the web server process has write access.
Remote attackers can read or write any file on the server, with privileges of the web server process.
Upgrade to version 1.6 or later of A1Stats:
Thanks to neme for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
|Date First Published:||2002-09-26|
|Date Last Updated:||2003-02-24 20:20 UTC|