In August 2004 I found XSS vulnerability in Microsoft ASP.Net, and now I publish it. Full details: En: http://it-project.ru/andir/docs/aspxvuln/aspxvuln.en.xml Ru: http://it-project.ru/andir/docs/aspxvuln/aspxvuln.ru.xml P.S. I to present my appologies for bad english :( My native language is Russian. With best regards, Andir! >From David Ahmad : >Please include the full details in your message. Thank you! Details from http://it-project.ru/andir/docs/aspxvuln/aspxvuln.en.xml: --------------------------------------------------------------------------------- XSS vulnerability in ASP.Net Andrey Rusyaev, post-graduate student, Security Chair, FESU (Far Eastern State University), Vladivostok, Russia, andir[SPAM-PROTECT]@it-project.ru. February 9, 2005, updated February 14, 2005 Abstract In specific conditions the cross-site scripting attack (XSS) [1] are possible on web site under management ASP.Net, because used a wrong filtration of special HTML characters. Attack exploits vulnerability of mechanism of converting Unicode strings [2] to national ASCII codepages. The basic problem arises from the lack of a filtration of special HTML characters in range U+ff00-U+ff60 (fullwidth ASCII characters [3]). Introduction The problem has been discovered in August 2004. Affected all versions of .Net Framework what exist at present day: * .Net Framework, version 1.0 * .Net Framework, version 1.0 + service pack 1 * .Net Framework, version 1.0 + service pack 2 * .Net Framework, version 1.1 * .Net Framework, version 1.1 + service pack 1 * .Net Framework, version 1.1 + service pack 1 + Security Bulletin MS05-004 from February 8, 2005 After some testing, similar problem has been discovered in free implementation of .Net Framework by Mono Project [4]. Affected following versions: * Mono, version 1.0.5. Note: Another versions has not been tested. Background .Net Framework manipulates strings in Unicode only. Converting from/to national codepages ASCII is possible for input/output respectively. In particular, HTML text may be outputted on Web page in national ASCII codepage (such as 'windows-1251', 'koi-8', and more) with using ASP.Net. In this conditions Unicode characters from range U+ff00-U+ff60 (fullwidth ASCII characters) would be converted to normal ASCII characters respectively. Among fullwidth ASCII characters present some special HTML characters (such as '<', '>', and others), which may be used for injecting malicious HTML code or malicious script code (with