The Microsoft .NET forms authentication capability for ASP.NET allows remote attackers to bypass authentication for .aspx files in restricted directories via a request containing a (1) "\" (backslash) or (2) "%5C" (encoded backslash), aka "Path Validation Vulnerability."
References
Link | Resource |
---|---|
http://archives.neohapsis.com/archives/ntbugtraq/2004-q3/0221.html | Exploit Vendor Advisory |
http://www.us-cert.gov/cas/techalerts/TA05-039A.html | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/283646 | Third Party Advisory US Government Resource |
http://sourceforge.net/mailarchive/forum.php?thread_id=5671607&forum_id=24754 | Broken Link |
http://www.securityfocus.com/bid/11342 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17644 | Third Party Advisory VDB Entry |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4987 | Third Party Advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3556 | Third Party Advisory |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-004 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2004-11-02 21:00
Updated : 2018-10-12 14:35
NVD link : CVE-2004-0847
Mitre link : CVE-2004-0847
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
microsoft
- asp.net