Synopsis
The remote host has a application that is affected by multiple vulnerabilities.
Description
There is a remote directory traversal vulnerability in Blog Torrent, a web-based application that allows users to host files for Bit Torrents.
There is a cross-site scripting issue in the remote version of this software that may allow an attacker to set up attacks against third parties by using the remote server.
Solution
Upgrade to BlogTorrent 0.81.
Plugin Details
File Name: torrent_xss.nasl
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Vulnerability Information
Required KB Items: www/PHP, Settings/ParanoidReport
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Vulnerability Publication Date: 12/2/2004
Reference Information
BID: 11839
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990