Plugin ID | 302 |
Plugin name | Blog Torrent btdownload.php directory traversal |
Plugin filename | Blog Torrent btdownload.php directory traversal.plugin |
Plugin filesize | 2439 bytes |
Plugin family | HTTP |
Plugin created name | Marc Ruef |
Plugin created email | marc.ruef at computec.ch |
Plugin created web | http://www.computec.ch |
Plugin created company | computec.ch |
Plugin created date | 2005/01/04 |
Plugin version | 1.0 |
Plugin protocol | tcp |
Plugin port | 80 |
Plugin procedure exploit | open|send GET /btdownload.php?type=torrent&file=../../../../../../../../../../etc/passwd HTTP/1.0\n\n|sleep|close|pattern_exists root: |
Plugin exploit accuracy | 98 |
Plugin comment | The NASL script is Copyright (C) Tenable Network Security. |
Bug advisory | http://www.securityfocus.com/archive/1/383048 |
Bug vulnerability class | Directory Traversal |
Bug description | There is a remote directory traversal vulnerability in Blog Torrent, a Web based application that allows users to host files for Bit Torrents. A malicious user can leverage this issue by requesting files outside of the web-server root directory with directory traversal strings such as '../'. This would allow a successful attacker to view arbitrary files that are readable by the web-server process. |
Bug fixing time | Approx. 10 minutes |
Bug exploit availability | Yes |
Bug exploit url | http://www.securityfocus.com/bid/11795/exploit/ |
Bug remote | Yes |
Bug local | Yes |
Bug severity | High |
Bug popularity | 6 |
Bug simplicity | 8 |
Bug impact | 8 |
Bug risk | 7 |
Bug Nessus risk | High |
Bug check tools | Nessus can check this flaw with the plugin 15904 (Blog Torrent Remote Directory Traversal). |
Source SecurityFocus BID | 11795 |
Source Nessus ID | 15904 |
Source Literature | Hacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427 |
Source Misc. | http://www.computec.ch |