How to Buy
This script is Copyright (C) 2011-2017 Tenable Network Security, Inc.
The remote web server contains a script that can be abused to copy
The web server hosts BlogEngine.NET, an open source .NET blogging
An install of the software on the remote host allows unauthenticated
access to the 'GetFile' function of the 'api/BlogImporter.asmx'
script. An unauthenticated, remote attacker may be able to abuse this
function to copy files on the affected host, possibly originating from
third-party hosts and possibly to directories outside the
application's 'App_Data\files' directory.
Successful exploitation may result in disclosure of sensitive
information, allow for execution of arbitrary code, fill up disk
space, or even facilitate attacks against third-party hosts.
Note that Nessus has only verified that the affected function and
script are accessible without authentication although it's possible
that the code has been changed to prevent abuse without changing how
it responds to the requests that Nessus uses.
See also :
Upgrade to BlogEngine.Net 2.0 or remove the affected script.
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true
Family: CGI abuses
Nessus Plugin ID: 51564 ()
Bugtraq ID: 45681
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.