6.7 Medium
AI Score
Confidence
Low
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.011 Low
EPSS
Percentile
84.2%
MacOS X creates a hidden file,
# SPDX-FileCopyrightText: 2001 Matt Moore, Modified by Noam Rathaus
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.10773");
script_version("2023-08-01T13:29:10+0000");
script_cve_id("CVE-2001-1446");
script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_tag(name:"cvss_base", value:"7.5");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:P/I:P/A:P");
script_name("MacOS X Finder '.FBCIndex' Information Disclosure");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2001 Matt Moore, Modified by Noam Rathaus");
script_family("Web application abuses");
script_dependencies("find_service.nasl", "no404.nasl", "webmirror.nasl", "DDI_Directory_Scanner.nasl", "global_settings.nasl");
script_require_ports("Services/www", 80);
script_exclude_keys("Settings/disable_cgi_scanning");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/3325");
script_xref(name:"URL", value:"https://www.kb.cert.org/vuls/id/177243");
script_tag(name:"solution", value:"Block access to hidden files (starting with a dot) within your webservers
configuration");
script_tag(name:"summary", value:"MacOS X creates a hidden file, '.FBCIndex' in each directory that has been
viewed with the Finder. This file contains the content of the files present
in the directory, giving an attacker information on the HTML tags, JavaScript,
passwords, or any other sensitive word used inside those files.");
script_tag(name:"solution_type", value:"Workaround");
script_tag(name:"qod_type", value:"remote_analysis");
exit(0);
}
include("http_func.inc");
include("http_keepalive.inc");
include("port_service_func.inc");
include("list_array_func.inc");
report = 'The following files were identified:\n';
port = http_get_port( default:80 );
foreach dir( make_list_unique( "/", http_cgi_dirs( port:port ) ) ) {
if( dir == "/" )
dir = "";
url = dir + "/.FBCIndex";
res = http_get_cache( port:port, item:url );
if( res =~ "^HTTP/1\.[01] 200" && "Bud2" >< res ) {
report += '\n' + http_report_vuln_url( port:port, url:url, url_only:TRUE );
found = TRUE;
}
}
if( found ) {
security_message( port:port, data:report );
exit( 0 );
}
exit( 99 );