发布时间 :2001-01-09 00:00:00
修订时间 :2016-10-17 22:08:47

[原文]Authentix Authentix100 allows remote attackers to bypass authentication by inserting a . (dot) into the URL for a protected directory.


        Authentix Authentix100存在漏洞。远程攻击者通过在受保护目录的URL中插入.(点)从而绕过认证。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)


- OVAL (用于检测的技术细节)


- 官方数据库链接
(官方数据源) MITRE
(官方数据源) NVD
(官方数据源) CNNVD

- 其它链接及资源
(UNKNOWN)  BUGTRAQ  20001106 Authentix Security Advisory
(UNKNOWN)  BUGTRAQ  20001107 Explanation Authentix Input Validation Error

- 漏洞信息

中危 输入验证
2001-01-09 00:00:00 2005-10-20 00:00:00
        Authentix Authentix100存在漏洞。远程攻击者通过在受保护目录的URL中插入.(点)从而绕过认证。

- 公告与补丁

        Flicks Software has advised all users of Authentix100 to upgrade to version 5.3 immediately.

- 漏洞信息

Authentix Authentix100 Injected Dot URL Authentication Bypass
Remote / Network Access Authentication Management, Input Manipulation
Loss of Integrity Upgrade
Vendor Verified

- 漏洞描述

- 时间线

2000-11-06 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 5.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Authentix Authentication Vulnerability
Input Validation Error 1907
Yes Yes
2000-11-01 12:00:00 2009-07-11 03:56:00
The vulnerability was first submitted to Bugtraq on November 1, 2000 by Lisa Saarloos <>

- 受影响的程序版本

Flicks Software Authentix 5.1 c
Flicks Software Authentix 5.3

- 不受影响的程序版本

Flicks Software Authentix 5.3

- 漏洞讨论

Authentix is a website protection package available from Flicks Software.

Authentix uses a web form-based, cookie free, authentication mechanism that protects all files on websites by validating user input against a stored database. By using special characters in a URL combined with some special circumstances an attacker could bypass the Authentix authentication login prompt and view files on the web server.

Normally, a user enters http://my.secured.server/protected-directory/filename.ext and is then prompted for a username and password. In order to bypass the authentication mechanism, a user can enter the following URL with the appropriate information substituted:


Please note the . after the protected-directory entry. Through trial and error, it is relatively trivial to guess the protected-directory and the default - filename.ext and then gain read access to the files. Some files, such as images, are not viewable.

- 漏洞利用

Please see discussion.

- 解决方案

Flicks Software has advised all users of Authentix100 to upgrade to version 5.3 immediately.

- 相关参考