what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

.NET Cross Site Scripting

.NET Cross Site Scripting
Posted Aug 30, 2012
Authored by Zamir Paltiel

A vulnerability in the .Net Request Validation mechanism allows bypassing the filter and execution of malicious scripts in the browsers of users via cross site scripting attacks. The exploitation technique explained here allows sending tags through the Request Validation Filter in a manner that will pass browser syntax and be rendered by browsers.

tags | exploit, xss
SHA-256 | 2e4ce4802fcc15ab4ea201c0086a4407e49cf77f81bc189e1205c8e38bb63357

.NET Cross Site Scripting

Change Mirror Download

.Net Cross Site Scripting - Request Validation Bypassing
==========================================
Seeker Research Center
By Zamir Paltiel, August 2012

Overview
========
A vulnerability in the .Net Request Validation mechanism allows bypassing the filter and execution of malicious scripts in the browsers of users via Cross Site Scripting attacks.
The exploitation technique explained here allows sending tags through the Request Validation Filter in a manner that will pass browser syntax and be rendered by browsers.

Details
========
The .Net Request Validation mechanism prevents attackers from sending tags as the value of the parameters. It is however possible to bypass this mechanism and send arbitrary tags that facilitate script execution.
This is caused by the fact that although <tag> is restricted by the Request Validation filter, <%tag> is not restricted but parsed by Internet Explorer browsers as a valid tag.

Exploit
=======
An example of the exploitation of this vulnerability would be crafting a link to a page that reflects a parameter value to the user.
As the value of the parameter the attacker would provide a <%tag> with the style attribute and an expression, for example: http://www.vulnerablesite.com/login.aspx?param=<%tag style="xss:expression(alert(123))" >
This will bypass the filter and execute the script in the brackets.

Affected Systems
================
This vulnerability has been tested on .Net frameworks 2.0 and above.

Vendor Response
===============
“The Request Validation Feature in ASP.NET is designed to perform basic input validation.  It is not designed to make security decisions for applications developed using ASP.NET.  Only the original developers can determine what content the ASP.NET application is designed to process and handle.  Microsoft recommends that all software developers perform input/data validation of all sources.  We do this to encourage our customers to make more robust applications that are less susceptible to security issues.  The Request Validation Feature was designed and released to help developers in this effort.  For more information about our recommendations to software developers, please see the following MSDN article:
http://msdn.microsoft.com/en-us/library/ff649487.aspx#pagguidelines0001_inputdatavalidation.”
Microsoft therefore will not be releasing a fix for this issue.

Credit
======
This vulnerability has been identified by Zamir Paltiel, Seeker Research Center.
For more information please visit http://www.quotium.com/prod/ResearchCenter/XSS-NetrequestValidation.php


Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close