You need to sign in to do that
Don't have an account?

ASP.net Ajax: How to mitigate cross site scripting security bug in ToolkitScriptManager.cs
We ran into a cross site scripting vulnerability and found out it was a problem caused by a bug in the Microsoft ASP.net Ajax Control Toolkit <http://www.asp.net/(S(vovsvx454o5rex452c4ypcy3))/ajax/>. We were able to implement and verify a fix since this is an open source project.
Here are the details from the Burp scanning report
The value of the _TSM_HiddenField_ request parameter is copied into a JavaScript string which is encapsulated in single quotation marks. The payload 6b05b\'%3balert(1)//508e8ca2e0a was submitted in the _TSM_HiddenField_ parameter. This input was echoed as 6b05b\\';alert(1)//508e8ca2e0a in the application's response. This proof-of-concept attack demonstrates that it is possible to inject arbitrary JavaScript into the application's response.
The mitigation is two fold:
The patch is available at http://ajax.codeplex.com/Project/Download/FileDownload.aspx?DownloadId=108879
Thanks, Frederic de Vedrines
|
All Answers
Hi, I have ran the same issue described. I updated the .cs file of the ToolkitScriptManager following the steps described here: http://forums.asp.net/p/1429764/3201259.aspx#3201259, but I have not been able to solve it ... do you have the modified file or any ideas ?
Thanks
Regards.