ASP.NET Security Vulnerability found - take steps NOW to secure your web.config

Quoted from the Microsoft Security Advisory “Microsoft is investigating a new public report of a vulnerability in ASP.NET. An attacker who exploited this vulnerability could view data, such as the View State, which was encrypted by the target server, or read data from files on the target server, such as web.config. This would allow the attacker to tamper with the contents of the data. By sending back the altered contents to an affected server, the attacker could observe the error codes returned by the server. We are not aware of attacks that try to use the reported vulnerabilities or of customer impact at this time.”

[Updated] - Update on Security Vulnerability

Additional Info and Workaround

Important: ASP.NET Security Vulnerability

Understanding the ASP.NET Vulnerability

ASP.NET POET Vulnerability - What Else Can I Do?

Oracle Padding Vulnerability in ASP.NET

Where can I ask Questions?

Post questions here



Will you give this article a +1 ? Thanks in advance


About The Author

Suprotim Agarwal
Suprotim Agarwal, ASP.NET Architecture MVP (Microsoft Most Valuable Professional) works as an Architect Consultant and provides consultancy on how to design and develop Web applications.

Suprotim is also the founder and primary contributor to DevCurry, DotNetCurry and SQLServerCurry. He is the Editor of a Developer Magazine called DNC Magazine. He has also written two EBooks 51 Recipes using jQuery with ASP.NET Controls. and The Absolutely Awesome jQuery CookBook

Follow him on twitter @suprotimagarwal

No comments: