SHARE
Facebook X Pinterest WhatsApp

Microsoft Probes Flaw in ASP.NET

Microsoft Corp. is investigating a reported security flaw in its ASP.NET technology that could allow intruders to access password-protected sections of a Web site simply by altering a URL. The hole involves a glitch in ASP.NET’s processing of URLs, a process known as canonicalization. According to an advisory posted Tuesday on Microsoft’s Web site, “an […]

Written By
thumbnail Simone Kaplan
Simone Kaplan
Oct 7, 2004
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Microsoft Corp. is investigating a reported security flaw in its ASP.NET technology that could allow intruders to access password-protected sections of a Web site simply by altering a URL.

The hole involves a glitch in ASP.NET’s processing of URLs, a process known as canonicalization. According to an advisory posted Tuesday on Microsoft’s Web site, “an attacker can send specially crafted requests to the server and view secured content without providing the proper credentials.”

ASP.NET, the latest iteration of Microsoft’s ASP (Active Server Pages) technology, is a Web development platform for building Web-centric applications.

Microsoft has yet to post a fix for the problem, but in its advisory, the company offered guidelines to help users temporarily secure their sites against intrusion attempts until a permanent patch is delivered.

“It has been reported that a malicious user could provide a specially formed URL that could result in the unsecured serving of unintended content,” a Microsoft spokeswoman said. “It’s under investigation, and we’re working on finding an appropriate solution.”

The company has yet to determine what the permanent fix will be or when it will be posted, she said.

According to Microsoft, the problem exists in ASP.NET running on Microsoft Windows 2000, Windows 2000 Server, Windows XP Professional and Windows Server 2003, but it does not affect ASP. That means the problem affects a lot of users. A story on Netcraft.com reports that ASP.NET is now running on more than 2.9 million active sites.

The reported security hole allows visitors to a password-protected ASP.NET site to put a forward-slash, a space or “%5c” in the place of the backslash in the site’s URL and bypass the password login screen, as well as bypass protections on administrative areas of the site.

Microsoft is asking ASP.NET users to add an event handler to force real path validation for all Web server requests—an approach that will keep intruders from gaining access to sensitive data but could result in a performance or security tradeoff of its own, said Arian Evans, senior security engineer at Kansas City, Mo.-based FishNet Security.

“[The fix] will impact performance because every single request that’s made to the Web server will have to be validated before it’s either authenticated or rejected,” Evans said. “That’s a lot of requests to be processed.”

Evans pointed out that Microsoft is no stranger to security problems related to password or directory traversal. In December, the company discovered a bug in Internet Explorer that let crackers rip off Web pages more easily.

The vulnerability has generated lively discussion on Slashdot. While many are lamenting that it’s yet another Microsoft security breach, one poster noted that the vulnerability is fairly easy to remedy:

“While I think the flaw itself is a concern, the ‘rewrite their applications’ quote is pure drivel. All that’s required is a couple of lines in Global.asax. That’s hardly a rewrite,” said a poster identified as Timesprout.

Check out eWEEK.com’s Security Center for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzer’s Weblog.


Be sure to add our eWEEK.com Security news feed to your RSS newsreader or My Yahoo page

http://isc.sans.org/diary.php?date=2004-10-06
http://www.k-otik.com/news/10052004.ASPNETFlaw.php
http://blogs.devleap.com/rob/archive/2004/10/02/1803.aspx
http://www.heise.de/security/news/meldung/51730

Recommended for you...

Report: Security Teams are Drowning in Alerts, Turning to AI
Jordan Smith
Sep 12, 2025
Mitel Appoints Mike Robinson as CEO
Jordan Smith
Sep 11, 2025
Cynomi Adds Third-Party Risk Management Module to vCISO Platform
Luis Millares
Sep 10, 2025
WatchGuard & Girona FC Partner on Security Needs
Victoria Durgin
Sep 10, 2025
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.