TUCoPS :: HP Unsorted A :: va1040.htm

ASP .NET "ValidateRequest" for Script Injection Attacks
PR08-20: Bypassing ASP .NET "ValidateRequest" for Script Injection Attacks
PR08-20: Bypassing ASP .NET "ValidateRequest" for Script Injection Attacks



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

The Microsoft .NET framework comes with a request validation feature,
configurable by the ValidateRequest setting. ValidateRequest has been a
feature of ASP.NET since version 1.1. This feature consists of a series
of filters, designed to prevent classic web input validation attacks
such as HTML injection and XSS (Cross-site Scripting). This paper
introduces script injection payloads that bypass ASP .NET web validation
filters and also details the trial-and-error procedure that was followed
to reverse-engineer such filters by analyzing .NET debug errors.

The original version of this paper was released in January 2006 for
private CPNI distribution. This paper has now been updated in August
2008 to include additional materials such as input payloads that bypass
the latest anti-XSS .NET patches (MS07-40) released in July 2007.

Paper:

http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf 


Advisory:

http://www.procheckup.com/Vulnerability_PR08-20.php 
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFIrctJoR/Hvsj3i8sRAjEWAJ9DjcWdNiGcEykEphn71QJqzB05OgCeOznJ
NVERfW1rIgUZyMWaKcMiSn8=lTNm
-----END PGP SIGNATURE-----

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH