1. /
  2. Security Response/
  3. Microsoft ASP.NET Application Folder Information Disclosure Vulnerability

Microsoft ASP.NET Application Folder Information Disclosure Vulnerability

Risk

Medium

Date Discovered

July 11, 2006

Description

ASP.NET is prone to an information-disclosure vulnerability. This issue is due to a failure in the applications to properly validate user-supplied input. An attacker can exploit this issue to retrieve potentially sensitive information. Information retrieved may aid in further attacks.

Technologies Affected

  • Microsoft .NET Framework 2.0

Recommendations

Block external access at the network boundary, unless external parties require service.

If possible, block access to the server at the network perimeter to allow only trusted hosts and networks to access the resources.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.

NIDS may detect attacks against web applications. Monitor logs on a regular basis.

Run all software as a nonprivileged user with minimal access rights.

If possible, run the hosting webserver with the least privileges required while still maintaining functionality.

Evaluate read, write, and execute permissions on all newly installed software.

Removing the 'Read' permissions from all ASP.NET Application Folders will mitigate exposure to this issue.
The vendor has released an advisory to address this issue in supported versions of the affected software.

Credits

Urs Eichmann is credited with the discovery of this vulnerability.
Copyright © Symantec Corporation.
Permission to redistribute this alert electronically is granted as long as it is not edited in any way unless authorized by Symantec Security Response. Reprinting the whole or part of this alert in any medium other than electronically requires permission from secure@symantec.com.

Disclaimer
The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information.
Symantec, Symantec products, Symantec Security Response, and secure@symantec.com are registered trademarks of Symantec Corp. and/or affiliated companies in the United States and other countries. All other registered and unregistered trademarks represented in this document are the sole property of their respective companies/owners.

Threat Intelligence

Subscribe
Follow the Threat Intelligence Twitter feed
STAR Antimalware Protection Technologies
Internet Security Threat Report, Volume 17
Symantec DeepSight Screensaver