CVE-2018-10245

Publication date 20 April 2018

Last updated 2 April 2026


Ubuntu priority

Negligible

Why this priority?

Cvss 3 Severity Score

5.3 · Medium

Score breakdown

Description

A Full Path Disclosure vulnerability in AWStats through 7.6 allows remote attackers to know where the config file is allocated, obtaining the full path of the server, a similar issue to CVE-2006-3682. The attack can, for example, use the awstats.pl framename and update parameters.

Read the notes from the security team

Status

Package Ubuntu Release Status
awstats 25.10 questing Ignored
25.04 plucky Ignored end of life, was needs-triage
24.10 oracular Ignored end of life, was needs-triage
24.04 LTS noble Ignored
23.10 mantic Ignored end of life, was needs-triage
23.04 lunar Ignored end of life, was needs-triage
22.10 kinetic Ignored end of life, was needs-triage
22.04 LTS jammy Ignored
21.10 impish Ignored end of life
21.04 hirsute Ignored end of life
20.10 groovy Ignored end of life
20.04 LTS focal Ignored end of standard support, was needs-triage
19.10 eoan Ignored end of life
19.04 disco Ignored end of life
18.10 cosmic Ignored end of life
18.04 LTS bionic Ignored end of standard support, was needs-triage
17.10 artful Ignored end of life
16.04 LTS xenial Ignored end of standard support, was needs-triage
14.04 LTS trusty Not in release

Notes


mdeslaur

This issue only makes sense when awstats isn't installed using distro packaging. In Ubuntu, the config file is in a well-known location. We will not be fixing this issue. Marking as ignored.

Severity score breakdown

Parameter Value
Base score 5.3 · Medium
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact None
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Access our resources on patching vulnerabilities