The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability."
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-004 | vendor advisory |
http://sourceforge.net/mailarchive/forum.php?thread_id=5671607&forum_id=24754 | broken link |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4987 | vdb entry third party advisory signature |
http://www.us-cert.gov/cas/techalerts/TA05-039A.html | third party advisory us government resource |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17644 | vdb entry third party advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3556 | vdb entry third party advisory signature |
http://www.kb.cert.org/vuls/id/283646 | third party advisory us government resource |
http://www.securityfocus.com/bid/11342 | vdb entry third party advisory |
http://archives.neohapsis.com/archives/ntbugtraq/2004-q3/0221.html | mailing list exploit vendor advisory |