ASP.NET Security Vulnerability found - take steps NOW to secure your web.config

Quoted from the Microsoft Security Advisory “Microsoft is investigating a new public report of a vulnerability in ASP.NET. An attacker who exploited this vulnerability could view data, such as the View State, which was encrypted by the target server, or read data from files on the target server, such as web.config. This would allow the attacker to tamper with the contents of the data. By sending back the altered contents to an affected server, the attacker could observe the error codes returned by the server. We are not aware of attacks that try to use the reported vulnerabilities or of customer impact at this time.”

[Updated] - Update on Security Vulnerability

Additional Info and Workaround

Important: ASP.NET Security Vulnerability

Understanding the ASP.NET Vulnerability

ASP.NET POET Vulnerability - What Else Can I Do?

Oracle Padding Vulnerability in ASP.NET

Where can I ask Questions?

Post questions here






About The Author

Suprotim Agarwal
Suprotim Agarwal, Developer Technologies MVP (Microsoft Most Valuable Professional) is the founder and contributor for DevCurry, DotNetCurry and SQLServerCurry. He is the Chief Editor of a Developer Magazine called DNC Magazine. He has also authored two Books - 51 Recipes using jQuery with ASP.NET Controls. and The Absolutely Awesome jQuery CookBook.

Follow him on twitter @suprotimagarwal.

No comments: