Description
An ASP.NET diagnostic page was found in this directory. Usually, such files are installed by developers to help them in testing their code or debug various parts of the application. This page discloses a lot of potentially sensitive information, such as: the list of environment variables, trace information, request details, list of server variables.
It's recommended to restrict access to this file.
Remediation
Adjust web.config to deny access to this entity without proper authorization.
<location path="dump.aspx"> <system.web> <authorization> <allow roles="Admin" /> <deny users="*" /> </authorization> </system.web> </location>
References
Related Vulnerabilities
Clickjacking: CSP frame-ancestors missing
ASP.NET expired session IDs are not regenerated
WordPress Plugin Backup Migration Arbitrary File Download (1.3.6)
WordPress Plugin NextGEN Gallery-WordPress Gallery Information Disclosure (1.9.11)
Insecure Transportation Security Protocol Supported (TLS 1.1)