.DS_Store” is an abbreviation for “Desktop Services Store”. These files are created automatically by Apples “Finder” software (which is part of their OS).
They store information about the files within a folder, including display options of folders, such as icon positions and view settings.
It may happen that .DS_Store files inadvertently leak filenames such as database backups or private administration panels.
Severity: high
Fingerprint: 5f32cf5d6962f09c5d6424645d642464c80786331bd9422ef0dd51d6f21052e3
Found 79 files trough .DS_Store spidering: /android-chrome-192x192.png /android-chrome-512x512.png /apple-touch-icon.png /browserconfig.xml /build /css /favicon-16x16.png /favicon-32x32.png /favicon.ico /fonts /fonts/demo.html /fonts/Laguna-Bold.eot /fonts/Laguna-Bold.svg /fonts/Laguna-Bold.ttf /fonts/Laguna-Bold.woff /fonts/Laguna-Bold.woff2 /fonts/Muli-Bold.eot /fonts/Muli-Bold.svg /fonts/Muli-Bold.ttf /fonts/Muli-Bold.woff /fonts/Muli-Bold.woff2 /fonts/Muli-BoldItalic.eot /fonts/Muli-BoldItalic.svg /fonts/Muli-BoldItalic.ttf /fonts/Muli-BoldItalic.woff /fonts/Muli-BoldItalic.woff2 /fonts/Muli-ExtraLight.eot /fonts/Muli-ExtraLight.svg /fonts/Muli-ExtraLight.ttf /fonts/Muli-ExtraLight.woff /fonts/Muli-ExtraLight.woff2 /fonts/Muli-ExtraLightItalic.eot /fonts/Muli-ExtraLightItalic.svg /fonts/Muli-ExtraLightItalic.ttf /fonts/Muli-ExtraLightItalic.woff /fonts/Muli-ExtraLightItalic.woff2 /fonts/Muli-Italic.eot /fonts/Muli-Italic.svg /fonts/Muli-Italic.ttf /fonts/Muli-Italic.woff /fonts/Muli-Italic.woff2 /fonts/Muli-Light.eot /fonts/Muli-Light.svg /fonts/Muli-Light.ttf /fonts/Muli-Light.woff /fonts/Muli-Light.woff2 /fonts/Muli-LightItalic.eot /fonts/Muli-LightItalic.svg /fonts/Muli-LightItalic.ttf /fonts/Muli-LightItalic.woff /fonts/Muli-LightItalic.woff2 /fonts/Muli-Semi-BoldItalic.eot /fonts/Muli-Semi-BoldItalic.svg /fonts/Muli-Semi-BoldItalic.ttf /fonts/Muli-Semi-BoldItalic.woff /fonts/Muli-Semi-BoldItalic.woff2 /fonts/Muli-SemiBold.eot /fonts/Muli-SemiBold.svg /fonts/Muli-SemiBold.ttf /fonts/Muli-SemiBold.woff /fonts/Muli-SemiBold.woff2 /fonts/Muli.eot /fonts/Muli.svg /fonts/Muli.ttf /fonts/Muli.woff /fonts/Muli.woff2 /fonts/stylesheet-fontface.css /fonts/stylesheet-fonts.css /hero.png /images /images/illustrations /images/illustrations/tinified /images/logos /images/psd /index.php /mstile-150x150.png /safari-pinned-tab.svg /site.webmanifest /transfonter.org-20220711-135049.zip
Severity: high
Fingerprint: 5f32cf5d6962f09c668fcbec668fcbec3ca3324b897689f6b846795e89cb09b7
Found 17 files trough .DS_Store spidering: /android-chrome-192x192.png /android-chrome-512x512.png /apple-touch-icon.png /browserconfig.xml /build /css /favicon-16x16.png /favicon-32x32.png /favicon.ico /fonts /hero.png /images /index.php /mstile-150x150.png /safari-pinned-tab.svg /site.webmanifest /transfonter.org-20220711-135049.zip
The application has Symfony profiling enabled.
It enables an attacker to access the following sensitive content :
Fingerprint: 407cf4363b0e62fafca67e07235964e5235964e5235964e5235964e5235964e5
Symfony profiler enabled: https://staging.neveus.com/_profiler/empty/search/results