Mobile app version of vmapp.org
Login or Join

Login to follow query

More posts by @Berumen354

1 Comments

Sorted by latest first Latest Oldest Best

 

@Angela700

ASP.NET Event validation does provide some level of protection against some specific web security attacks.

Request Validation, a feature included in ASP.NET 1.1, may not adequately sanitize hostile user-supplied input. ASP scripts that depend on Request Validation to sanitize user-supplied input may still be prone to cross-site scripting or HTML injection attacks as a result. Request Validation may be bypassed by including a null byte (%00) in malicious user-supplied input.

Microsoft ASP.NET Request Validation Null Byte Filter Bypass Vulnerability

Microsoft has addressed this issue in a Hotfix rollup package and is available by contacting the vendor. Further information can be obtained from this link.

10% popularity Vote Up Vote Down


Back to top | Use Dark Theme