Blog Torrent < 0.81 btdownload.php Multiple Vulnerabilities

medium Nessus Plugin ID 15924

Synopsis

The remote host has a application that is affected by multiple vulnerabilities.

Description

There is a remote directory traversal vulnerability in Blog Torrent, a web-based application that allows users to host files for Bit Torrents.

There is a cross-site scripting issue in the remote version of this software that may allow an attacker to set up attacks against third parties by using the remote server.

Solution

Upgrade to BlogTorrent 0.81.

Plugin Details

Severity: Medium

ID: 15924

File Name: torrent_xss.nasl

Version: 1.21

Type: remote

Family: CGI abuses

Published: 12/7/2004

Updated: 1/19/2021

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Information

Required KB Items: www/PHP, Settings/ParanoidReport

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 12/2/2004

Reference Information

BID: 11839

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990