Last post Sep 20, 2010 02:07 PM by Lakario
Sep 20, 2010 01:55 PM|Lakario|LINK
In the video
here which demonstrates the vulnerability being applied against a DotNetNuke application the demonstrator takes a value appended to the end of an auto-embedded
WebResource.axd script src attribute.
If WebResource.axd is not being used in the application (i.e. in an MVC application), which other aspects of the application can expose this necessary information?
Sep 20, 2010 02:03 PM|Mikesdotnetting|LINK
Cookies for starters. Anything that contains "cipher text".
Sep 20, 2010 02:04 PM|Sl0vi|LINK
ASP.Net will respond to a request to WebResource.axd and ScriptResource.axd, even if you don't use them, and it will apparently completely ignore all your code and configuration and service the request anyway.
Sep 20, 2010 02:07 PM|Lakario|LINK
@Sl0vi You say WebResource.axd and ScriptResource.axd will respond to a request even if I am not using them, but wouldn't you need some piece of the cypher text to produce anything usefulf from them anyway? Simply put, it shouldn't matter if they're served
so long as the cypher isn't served by them directly.
Are WebResource.axd and ScriptResource.axd the request targets which are used for the attack once the encrypted cypher is obtained?