Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework without the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a "</" (less-than slash) sequence.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://www.procheckup.com/PDFs/bypassing-dot-NET-ValidateRequest.pdf | broken link |
http://securityreason.com/securityalert/4193 | third party advisory |
http://www.securityfocus.com/archive/1/495667/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44741 | vdb entry |