Ò׽ؽØͼÈí¼þ¡¢µ¥Îļþ¡¢Ãâ°²×°¡¢´¿ÂÌÉ«¡¢½ö160KB

asp.net viewstat Tampering Vulnerabilities

Trustwave's SpiderLabs Security Advisory TWSL2010-001:
Multiplatform View State Tampering Vulnerabilities
Published: 2010-02-08 Version: 1.1
SpiderLabs has documented view state tampering
vulnerabilities in three products from separate vendors.
View states are used by some web application frameworks to
store the state of HTML GUI controls. View states are
typically stored in hidden client-side input fields,
although server-side storage is widely supported.
The affected vendors generally recommend that client-side
view states are cryptographically signed and/or encrypted,
but specific exploits have not been previously documented.
These vulnerabilities show that unsigned client-side view
states will ALWAYS result in a vulnerability in the affected
products.
Credit: David Byrne of Trustwave's SpiderLabs
===============================================
Vendor: Microsoft (http://www.microsoft.com)
Product: ASP.Net (http://www.asp.net)
Versions affected: .Net 3.5 is confirmed vulnerable;
previous versions are likely to be vulnerable as well.
Description:
ASP.Net is a web-application development framework that
provides for both user interfaces, and back-end
functionality.
The ASP.Net view state is typically stored in a hidden field
named "__VIEWSTATE". When a page's view state is not
cryptographically signed, many standard .Net controls are
vulnerable to Cross-Site Scripting (XSS) through the view
state.
It is well documented that using an unsigned view state is
"bad", but most previous advisories focus on vaguely
described threats or vulnerabilities introduced by custom
use of the view state. To the best of Trustwave's knowledge,
this is the first time a proof of concept attack of this
nature has been demonstrated against the view state. A
vulnerability was alluded to in a 2004 Microsoft article on
troubleshooting view state problems [1]. However, other
Microsoft documents recommend disabling view state signing
"if performance is a ke


Ïà¹ØÎĵµ£º

ASP.net ¿çƽ̨Linux

½üÀ´£¬Ëæ×ÅMono2.4ºÍJexus web server 2.3µÄ³É¹¦·¢²¼£¬ÔÚLinux ƽ̨¼ÜÉèAsp.netµÄʱ»úÒѾ­ÍêÈ«³ÉÊì¡£ÓÉÓÚLinux·þÎñÆ÷ϵͳËù¾ß±¸µÄ´óÁ¿µÄÓŵ㣬¿ÉÒÔÔ¤¼Æ£¬¿çƽ̨µÄLinux ASP.NETÍøÕ¾±Ø½«½øÈëÎÒÃǵŤ×÷ÓëÉú²úʵ¼Ê¡£
Ãû´Ê½âÊÍ£º
Ò»¡¢Mono:
MonoÊÇÒ»¸ö¿ªÔ´ÏîÄ¿£¬ÊÇ°´ECMA-335¶¨ÒåµÄ±ê×¼Ö´ÐÐ.NET¿ò¼Ü£¬¼òµ¥µØ˵£¬Mono¾ÍÊÇ ......

asp.netÁ¬access

1¡¢¾ø¶Ô·¾¶Á¬½Ó×Ö·û´®
Provider=Microsoft.Jet.OLEDB.4.0;Data Source=c:\somepath\myDb.mdb
2¡¢Ïà¶Ô·¾¶Á¬½Ó×Ö·û´®
"Provider=Microsoft.Jet.OLEDB.4.0;Data Source=" & Server.MapPath("/date/fghsdf.mdb")
¿ÉÒÔÓãº
web.config:
<appSettings>
 <add key="ConnectString" value="Provider=Mic ......

ASP.NETÒ³ÃæÆÊÎö(1)

ÔÚWebÓ¦ÓóÌÐòÉÏÏÂÎÄÖУ¬ASP.NETÒ³Ãæ»áÔÚµÚÒ»´Î±»ÇëÇóʱ£¬°´Ðè±»¶¯Ì¬±àÒë¡£¶¯Ì¬±àÒë²¢²»ÊÇASP.NETÒ³Ãæ(.aspxÎļþ)ÌØÓеģ¬
»¹·¢ÉúÔÚ.NET
Web·þÎñ(.asmxÎļþ)¡¢WebÓû§¿Ø¼þ(.ascxÎļþ)¡¢HTTP´¦Àí³ÌÐò(.ashxÎļþ)£¬ÒÔ¼°ÆäËû¼¸ÖÖASP.NETÓ¦ÓóÌÐòÎļþ(Èç
global.asaxÎļþ)ÉíÉÏ¡£ÔËÐÐʱ¹ÜµÀÄ£Ð͸ºÔð´¦ÀíÊäÈëµÄ(incoming)HTTPÊ ......

³¹µ×½â¾öIE6ÏÂAsp.net Ajax¿Í»§¶Ë¿ò¼ÜδÄܼÓÔØ

×î½üµÄÏîÄ¿ÀïÓõ½AjaxControlToolkit 3.5,ÏîÄ¿Íê³ÉÒÔºóÔÚ±¾µØ²âÊÔûÎÊÌ⣬·Åµ½·þÎñÆ÷ÉÏÈ¥ÔÚIE6¾Í³öÏÖAjax ¿Í»§¶Ë¿ò¼ÜδÄܼÓÔصÄÎÊÌ⣬ÔÚFF£¬IE7£¬Opera£¬SafariµÈä¯ÀÀÆ÷¶¼Ã»ÎÊÌ⣬ÕæÊǸ㲻¶®MSÔõô¸ãµÃ£¬ÏÖÔÚ ¾ÍÏëÅ×ÆúIE6£¬ÕҵĺÃÐÁ¿à°¡£¬ÍøÉÏ˵µÄ½â¾ö·½°¸¶¼ÊÔ¹ýÁË£¬¶¼Ã»Óã¬×îºóÕÒµ½µÄ´ð°¸ÊÇ£ºÓ¦ÓóÌÐòµÄ±àÂëÎÊ Ì⣬ֻҪÔÚ ......

ASP.NETʵÓÃÐÔ¼¼Çɾ«ÝÍ

1.Ö÷ÒªÃüÃû¿Õ¼ä:
1.<% @ Import Namespace="System.Data" %> ´¦ÀíÊý¾ÝʱÓõ½
2.   <% @ Import Namespace="System.Data.ADO" % >   ʹÓÃADO.net ʱÓõ½
3.   <% @ Import Namespace="System.Data.SQL" %>   SQL Server Êý¾Ý¿âרÓÃ
4.   <% @ ......
© 2009 ej38.com All Rights Reserved. ¹ØÓÚE½¡ÍøÁªÏµÎÒÃÇ | Õ¾µãµØͼ | ¸ÓICP±¸09004571ºÅ