Synopsis
The remote host is affected by an information disclosure vulnerability.
Description
The ASP.NET web application running in the root directory of the remote web server has application tracing enabled. This allows an unauthenticated, remote attacker to view the last 50 web requests made to the server, including sensitive information like Session ID values and the physical path to the requested file.
Solution
Set <trace enabled=false> in web.config
Plugin Details
File Name: DDI_IIS_dotNet_Trace.nasl
Configuration: Enable thorough checks
Supported Sensors: Nessus
Vulnerability Information
CPE: cpe:/a:microsoft:asp.net
Vulnerability Publication Date: 1/1/2002