Wget Listing File Detected

medium Web App Scanning Plugin ID 113227

Synopsis

Wget Listing File Detected

Description

The web server on the remote host contains publicly accessible Wget listing files. These listing files are produced by Wget during ftp transfers and contain details of source/destination file names, permissions, date of upload and other potentially sensitive information. This may be used to access content from the web server that might otherwise be private.

Solution

Remove the Wget .listing file.

See Also

https://www.gnu.org/software/wget/manual/wget.html

Plugin Details

Severity: Medium

ID: 113227

Type: remote

Published: 5/18/2022

Updated: 5/5/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

CVSS Score Source: Tenable

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information