Korean
<< Back
VID 22163
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Apache server used with MacOS X client discloses the indexing data from the content of a hidden file.
The MacOS X with the Finder-By-Content feature creates indexing data from the contents of files in each directory. It then stores the indexing data for each directory in a hidden file ".FBCIndx" within each directory, is world-readable file. A remote attacker can read the indexed contents of files by sending to the Apache server as the following :

http://apache_server/target_directory/.FBCIndex

Using this vulnerability, a remote attacker can gain the sensitive information such as the potential passwords used by attacker in directory, system configuration, installed applications, etc. , then perform the further attack against the target server.


* Platforms Affected :
Apache 1.3.14 for used with the following:
- Apple MacOS X 10.0
- Apple MacOS X 10.0.1
- Apple MacOS X 10.0.2
- Apple MacOS X 10.0.3
- Apple MacOS X 10.0.4
Recommendation No solution available as of February 2003.

As the workaround, use a <FilesMatch> directive in httpd.conf to block access to any hidden file:

<FilesMatch "^\.">
Order allow, deny
Deny from all
</FilesMatch>
Related URL CVE-2001-1446 (CVE)
Related URL 3316,3324,3325 (SecurityFocus)
Related URL 7103 (ISS)