Lucene search

K
certCERTVU:455604
HistoryOct 10, 2006 - 12:00 a.m.

Microsoft .NET Framework contains a cross-site scripting vulnerability

2006-10-1000:00:00
www.kb.cert.org
15

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.914 High

EPSS

Percentile

98.9%

Overview

The Microsoft .NET Framework contains a cross-site scripting vulnerability that may allow an attacker to read or modify data in web pages and cookies.

Description

The Microsoft .NET Framework is a managed code programming model for Microsoft Windows operating systems. Microsoft ASP.NET is a technology designed to allow programmers to create dynamic web sites and web applications.

A cross-site scripting vulnerability exists in the .NET Framework 2.0. This vulnerability occurs due to improper validation of HTTP request values.


Impact

An attacker may be able to obtain sensitive data from a user of a web site running a vulnerable version of the .NET Framework. Depending on the nature of the web site, this data may include passwords, credit card numbers, and any arbitrary information provided by the user. Likewise, information stored in cookies could be stolen or corrupted.


Solution

Update
Microsoft has released an update to address this issue. See Microsoft Security Bulletin MS06-056 for more details.


Workarounds for administrators

According to Microsoft, setting the AutoPostBack property to false may mitigate the affects of this vulnerability. See Microsoft Knowledgebase article 328923 for more information about the AutoPostBack property.

Workarounds for users

* Do not follow untrusted hyperlinks, especially if they are sent through email or instant messenger programs.
* Disable JavaScript. See the [Securing your Web Browser](<http://www.cert.org/tech_tips/securing_browser/>) document for instructions. Note that disabling JavaScript may reduce the functionality and features provided by some web sites.
* TypeURLs directly in the web browser's address bar, or use bookmarks to navigate to web sites.
* See the [Cross-Site Scripting Vulnerabilities](<http://www.cert.org/archive/pdf/cross_site_scripting.pdf>) document for general information.  

Vendor Information

455604

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Microsoft Corporation __ Affected

Updated: October 10, 2006

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Please see Microsoft Security Bulletin MS06-056.

If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23455604 Feedback>).

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Microsoft credits Jaswinder Hayre for reporting this vulnerability.

This document was written by Ryan Giobbi.

Other Information

CVE IDs: CVE-2006-3436
Severity Metric: 0.96 Date Public:

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.914 High

EPSS

Percentile

98.9%