Feeds

MS bitten by old .NET vulnerability

Cross-site scripting again

  • alert
  • submit to reddit

Intelligent flash storage arrays

Numerous installations of Microsoft ASP.NET are vulnerable to cross-site scripting (CSS), according to a recent post by Johannes Westerink to the BugTraq mailing list.

CSS leverages JavaScript and makes it possible to place a malicious URL in an e-mail or on a Web site, which if followed will compromise the user's machine by various means, including exposing shares and/or retrieving data files such as cookies.

JavaScript can also be executed on a remote server using malicious URLs. There are numerous possible attacks; but for one common example, a 404 page may be generated with the added bonus of full path disclosure.

Examples discovered by Westerink include:

http://www.msn.com/~/&ltscript&gtalert(document.cookie)</script&gt.aspx?aspxerrorpath=null
http://my.msn.com/~/&ltscript&gtalert(document.cookie)</script&gt.aspx?aspxerrorpath=null
http://dotnet.microsoft.com/&ltscript&gtalert(document.cookie)</script&gt.aspx
http://terraserver.microsoft.net/&ltscript&gtalert(document.cookie)</script&gt.aspx
http://support.microsoft.com/~/&ltscript&gtalert(document.cookie)</script&gt.aspx?aspxerrorpath=null
http://office.microsoft.com/~/&ltscript&gtalert(document.cookie)</script&gt.aspx?aspxerrorpath=null
http://communities.microsoft.com/~/&ltscript&gtalert(document.cookie)</script&gt.aspx
http://uddi.microsoft.com/~/&ltscript&gtalert(document.cookie)</script&gt.aspx

Westerink says he contacted MS about the issue six months ago but never got a reply.

Meanwhile, Internet security and privacy consultant Richard M. Smith, who now maintains the site ComputerBytesMan.com, "checked in with Microsoft about this problem and was told that this is a known bug that was fixed in ASP.NET before the final software was shipped."

So MS got the message all right, but somehow neglected to mention it to anyone, or even thank Westerink for bringing it to their attention.

"The various Microsoft Web servers that still have the bug are running pre-release versions of ASP.NET," Smith adds. "It looks like Microsoft also has trouble keeping up with security patches and updates."

One hopes they'll have got this sorted by press time.... ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.