CVE-2000-1133
CVSS5.0
发布时间 :2001-01-09 00:00:00
修订时间 :2016-10-17 22:08:47
NMCOS    

[原文]Authentix Authentix100 allows remote attackers to bypass authentication by inserting a . (dot) into the URL for a protected directory.


[CNNVD]Authentix认证漏洞(CNNVD-200101-058)

        Authentix Authentix100存在漏洞。远程攻击者通过在受保护目录的URL中插入.(点)从而绕过认证。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2000-1133
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2000-1133
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200101-058
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=97353881829760&w=2
(UNKNOWN)  BUGTRAQ  20001106 Authentix Security Advisory
http://marc.info/?l=bugtraq&m=97362374200478&w=2
(UNKNOWN)  BUGTRAQ  20001107 Explanation Authentix Input Validation Error
http://www.securityfocus.com/bid/1907
(VENDOR_ADVISORY)  BID  1907

- 漏洞信息

Authentix认证漏洞
中危 输入验证
2001-01-09 00:00:00 2005-10-20 00:00:00
远程※本地  
        Authentix Authentix100存在漏洞。远程攻击者通过在受保护目录的URL中插入.(点)从而绕过认证。

- 公告与补丁

        Flicks Software has advised all users of Authentix100 to upgrade to version 5.3 immediately.

- 漏洞信息

13382
Authentix Authentix100 Injected Dot URL Authentication Bypass
Remote / Network Access Authentication Management, Input Manipulation
Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

- 时间线

2000-11-06 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 5.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Authentix Authentication Vulnerability
Input Validation Error 1907
Yes Yes
2000-11-01 12:00:00 2009-07-11 03:56:00
The vulnerability was first submitted to Bugtraq on November 1, 2000 by Lisa Saarloos <lisa@magnashop.nl>

- 受影响的程序版本

Flicks Software Authentix 5.1 c
Flicks Software Authentix 5.3

- 不受影响的程序版本

Flicks Software Authentix 5.3

- 漏洞讨论

Authentix is a website protection package available from Flicks Software.

Authentix uses a web form-based, cookie free, authentication mechanism that protects all files on websites by validating user input against a stored database. By using special characters in a URL combined with some special circumstances an attacker could bypass the Authentix authentication login prompt and view files on the web server.

Normally, a user enters http://my.secured.server/protected-directory/filename.ext and is then prompted for a username and password. In order to bypass the authentication mechanism, a user can enter the following URL with the appropriate information substituted:

http://my.secured.server/protected-directory./filename.ext

Please note the . after the protected-directory entry. Through trial and error, it is relatively trivial to guess the protected-directory and the default - filename.ext and then gain read access to the files. Some files, such as images, are not viewable.

- 漏洞利用

Please see discussion.

- 解决方案

Flicks Software has advised all users of Authentix100 to upgrade to version 5.3 immediately.

- 相关参考

     

     

    关于SCAP中文社区

    SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

    版权声明

    CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站