Considering the recent ASP.NET vulnerability, what should I look for in my httphandlers that would cause such a Padding Oracle vulnerability?
Asked in another way... what did MSFT do wrong and what did they fix in their handlers?
Considering the recent ASP.NET vulnerability, what should I look for in my httphandlers that would cause such a Padding Oracle vulnerability?
Asked in another way... what did MSFT do wrong and what did they fix in their handlers?
I think the wronge is that they give "too much" informations about the error.
@Sri here analyze it very well
http://stackoverflow.com/questions/3720720/how-serious-is-this-new-asp-net-security-vulnerability-and-how-can-i-workaround-i/3721473#3721473
There were 3 problems with WebResource.axd and ScriptResource.axd:
Bottom line, don't allow more access than necessary and only if you really need encryption/decryption tamper proof it.
Back in the day I blogged about how it related to getting different levels of access