Authentix Authentication Vulnerability
BID:1907
Info
Authentix Authentication Vulnerability
| Bugtraq ID: | 1907 |
| Class: | Input Validation Error |
| CVE: |
CVE-2000-1133 |
| Remote: | Yes |
| Local: | Yes |
| Published: | Nov 01 2000 12:00AM |
| Updated: | Jul 11 2009 03:56AM |
| Credit: | The vulnerability was first submitted to Bugtraq on November 1, 2000 by Lisa Saarloos <[email protected]> |
| Vulnerable: |
Flicks Software Authentix 5.1 c |
| Not Vulnerable: |
Flicks Software Authentix 5.3 |
Discussion
Authentix Authentication Vulnerability
Authentix is a website protection package available from Flicks Software.
Authentix uses a web form-based, cookie free, authentication mechanism that protects all files on websites by validating user input against a stored database. By using special characters in a URL combined with some special circumstances an attacker could bypass the Authentix authentication login prompt and view files on the web server.
Normally, a user enters http://my.secured.server/protected-directory/filename.ext and is then prompted for a username and password. In order to bypass the authentication mechanism, a user can enter the following URL with the appropriate information substituted:
http://my.secured.server/protected-directory./filename.ext
Please note the . after the protected-directory entry. Through trial and error, it is relatively trivial to guess the protected-directory and the default - filename.ext and then gain read access to the files. Some files, such as images, are not viewable.
Authentix is a website protection package available from Flicks Software.
Authentix uses a web form-based, cookie free, authentication mechanism that protects all files on websites by validating user input against a stored database. By using special characters in a URL combined with some special circumstances an attacker could bypass the Authentix authentication login prompt and view files on the web server.
Normally, a user enters http://my.secured.server/protected-directory/filename.ext and is then prompted for a username and password. In order to bypass the authentication mechanism, a user can enter the following URL with the appropriate information substituted:
http://my.secured.server/protected-directory./filename.ext
Please note the . after the protected-directory entry. Through trial and error, it is relatively trivial to guess the protected-directory and the default - filename.ext and then gain read access to the files. Some files, such as images, are not viewable.
Exploit / POC
Authentix Authentication Vulnerability
Please see discussion.
Please see discussion.
Solution / Fix
Authentix Authentication Vulnerability
Solution:
Flicks Software has advised all users of Authentix100 to upgrade to version 5.3 immediately.
Solution:
Flicks Software has advised all users of Authentix100 to upgrade to version 5.3 immediately.
References
Authentix Authentication Vulnerability
References:
References: