Description
WebDAV is enabled on this server and this directory has write permissions enabled. Acunetix was able to create a test file within this directory using the PUT method. The PUT method is a part of the WebDAV standard for remote content editing. A poorly configured Web server can mistakenly provide remote access to the PUT method without requiring any form of login. Even more, the scanner was able to rename this file to filename.asp;.jpg and then execute code in the context of the web server.
Remediation
Remove write permissions from this directory or disable WebDAV if it's not being used.
References
Related Vulnerabilities
Content-Security-Policy-Report-Only Cannot Be Declared Between META Tags
WordPress Plugin VIDEO GALLERY 'upload1.php' Arbitrary File Upload (1.3)
WordPress Plugin wp superb Slideshow 'upload.php' Arbitrary File Upload (2.2)
WordPress Plugin VikBooking Hotel Booking Engine & PMS Multiple Vulnerabilities (1.5.3)