📄 osx_apache_finder_content.nasl
字号:
## This script was originally written by Matt Moore <matt.moore@westpoint.ltd.uk># www.westpoint.ltd.uk## Modified by Noam Rathaus <noamr@securiteam.com>## Script audit and contributions from Carmichael Security <http://www.carmichaelsecurity.com># Erik Anderson <eanders@carmichaelsecurity.com># Added BugtraqID## See the Nessus Scripts License for details#if(description){ script_id(10773); script_cve_id("CAN-2001-1446"); script_bugtraq_id(3325); script_version ("$Revision: 38 $"); name["english"] = "MacOS X Finder reveals contents of Apache Web files"; script_name(english:name["english"]); desc["english"] = "MacOS X creates a hidden file, '.FBCIndex' in each directory that has been viewed with the Finder. This file contains the content of the files present in the directory, giving an attacker information on the HTML tags, JavaScript, passwords, or any other sensitive word used inside those files. Solution: Use a <FilesMatch> directive in httpd.conf to restrict access to 'hidden' files:<FilesMatch '^\.'>Order allow, denyDeny from all</FilesMatch>And restart Apache.Risk factor : Medium"; script_description(english:desc["english"]); summary["english"] = "MacOS X Finder reveals contents of Apache Web files"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2001 Matt Moore, Modified by Noam Rathaus"); family["english"] = "CGI abuses"; script_family(english:family["english"]); script_dependencie("find_service.nes", "no404.nasl", "http_version.nasl"); script_require_ports("Services/www", 80); script_require_keys("www/apache"); exit(0);}# Check for .FBCIndex in the root of the web site # Could be improved to use the output of webmirror.nasl to create a list of folders to try... # This is very important since most ROOT directories do not contain it! TODOinclude("http_func.inc");include("http_keepalive.inc");port = get_http_port(default:80);if(get_port_state(port)){ req = http_get(item:"/.FBCIndex", port:port); # Check in web root r = http_keepalive_send_recv(port:port, data:req); if("Bud2" >< r) security_warning(port);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -