ASA-202103-15 log generated external raw

[ASA-202103-15] awstats: directory traversal
Arch Linux Security Advisory ASA-202103-15 ========================================== Severity: High Date : 2021-03-25 CVE-ID : CVE-2020-35176 Package : awstats Type : directory traversal Remote : Yes Link : https://security.archlinux.org/AVG-1356 Summary ======= The package awstats before version 7.8-3 is vulnerable to directory traversal. Resolution ========== Upgrade to 7.8-3. # pacman -Syu "awstats>=7.8-3" The problem has been fixed upstream but no release is available yet. Workaround ========== None. Description =========== In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. This issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600. Impact ====== A malicious user could access files on the filesystem. References ========== https://bugs.archlinux.org/task/69301 https://github.com/eldy/awstats/issues/195 https://github.com/eldy/awstats/pull/196 https://github.com/eldy/AWStats/commit/0d4d4c05f8e73be8f71dd361dc55cbd52858b823 https://security.archlinux.org/CVE-2020-35176