|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Microsoft .NET: information disclosure via customErrors
Synthesis of the vulnerability
An attacker can generate an error in a Microsoft .NET/ASP.NET application, in order to obtain sensitive information.
Vulnerable systems: IIS, .NET Framework, Windows 2003, Windows 2008 R0, Windows 2008 R2, Windows 2012, Windows 7, Windows 8, Windows RT, Windows Vista.
Severity of this threat: 2/4.
Consequences of an attack: data reading.
Pirate's origin: internet client.
Creation date: 14/04/2015.
Références of this weakness: 3048010, CERTFR-2015-AVI-159, CVE-2015-1648, MS15-041, VIGILANCE-VUL-16604.
Description of the vulnerability
The Microsoft .NET uses the ASP.NET customErrors directive to define the type of error messages to be displayed.
However, when the customErrors mode is disabled, an attacker can trigger an error in order to read details about the application.
An attacker can therefore generate an error in a Microsoft .NET/ASP.NET application, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a software vulnerability watch. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.