[Full-Disclosure] Re: ASP.NET cannonicalization issue

From: Jelson Pat (australia001_at_yahoo.com.au)
Date: 10/07/04

  • Next message: Simon: "Re: [Full-Disclosure] House approves spyware legislation"
    To: bugtraq@securityfocus.com
    Date: Fri, 8 Oct 2004 07:52:37 +1000 (EST)
    
    

    more technical details :
     
    http://isc.sans.org/diary.php?date=2004-10-06
    http://www.k-otik.com/news/10052004.ASPNETFlaw.php
    http://blogs.devleap.com/rob/archive/2004/10/02/1803.aspx
    http://www.heise.de/security/news/meldung/51730
     
    cheers
    Stephen

    "Evans, Arian" <Arian.Evans@fishnetsecurity.com> wrote:
    Hadn't seen this on the lists yet:

    Cannonicalization issue in ASP.NET

    Microsoft is currently investigating a reported
    vulnerability in Microsoft ASP.NET. An attacker
    can send specially crafted requests to the server
    and view secured content without providing the
    proper credentials. This reported vulnerability
    exists in ASP.NET and does not affect ASP.

    http://www.microsoft.com/security/incident/aspnet.mspx

    Their interim "fix" is to add an event handler to
    force real path validation for all requests:

    http://support.microsoft.com/?kbid=887459

    Which is certainly not a bad idea but methinks
    another performance/security tradeoff at hand.

    Thanks for the heads-up Daniel...

    Arian Evans
    Sr. Security Engineer
    FishNet Security

    KC Office: 816.421.6611
    Direct: 816.701.2045
    Toll Free: 888.732.9406
    Fax: 816.474.0394

    http://www.fishnetsecurity.com

    The information transmitted in this e-mail is intended only for the addressee and may contain confidential and/or privileged material.
    Any interception, review, retransmission, dissemination, or other use of, or taking of any action upon this information by persons or entities
    other than the intended recipient is prohibited by law and may subject them to criminal or civil liability. If you received this communication
    in error, please contact us immediately at 816.421.6611, and delete the communication from any computer or network system.

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html

    ---------------------------------
    Find local movie times and trailers on Yahoo! Movies.

    _______________________________________________
    Full-Disclosure - We believe in it.
    Charter: http://lists.netsys.com/full-disclosure-charter.html


  • Next message: Simon: "Re: [Full-Disclosure] House approves spyware legislation"

    Relevant Pages

    • [Full-Disclosure] Re: ASP.NET cannonicalization issue
      ... Microsoft is currently investigating a reported ... vulnerability in Microsoft ASP.NET. ... Charter: http://lists.netsys.com/full-disclosure-charter.html ... Find local movie times and trailers on Yahoo! ...
      (Full-Disclosure)
    • SecurityFocus Microsoft Newsletter #176
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows XP HCP URI Handler Arbitrary Command Execu... ... PHPNuke Category Parameter SQL Injection Vulnerability ... Microsoft Baseline Security Analyzer Vulnerability Identific... ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #83
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft IIS CodeBrws.ASP Source Code Disclosure Vulnerability ... Microsoft Internet Explorer History List Script Injection ... Microsoft Windows 2000 Lanman Denial of Service Vulnerability ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #81
      ... MICROSOFT VULNERABILITY SUMMARY ... WWWIsis Remote Command Execution Vulnerability ... Windows NT 4.0 Print Spooler Security ...
      (Focus-Microsoft)
    • SecurityFocus Microsoft Newsletter #336
      ... MICROSOFT VULNERABILITY SUMMARY ... Microsoft Windows Unspecified Remote Code Execution Vulnerability ... Microsoft Windows Explorer BMP Image Denial of Service Vulnerability ... An attacker could leverage this issue to have arbitrary code execute with kernel level privileges. ...
      (Focus-Microsoft)