Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. .NET is Hell (subtitle: Microsoft warning!)

.NET is Hell (subtitle: Microsoft warning!)

Scheduled Pinned Locked Moved The Lounge
csharpdotnetcomsecuritytesting
12 Posts 4 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • M Offline
    M Offline
    MacSpudster
    wrote on last edited by
    #1

    I get an email whenever there's an error on my webapps. We recently initiated a service to do Red-Siren testing; e.g., testing for any security issues. Got an error message today. Of most interest, and danged funny at that, is the unedited, verbatim "Error Message" from Microsoft's lovely .NET Framework ... (emphasis added) URL: https : / / www.RedactedWebSite.com /SomeWebApp/ThatLoginPage.aspx?ReturnUrl=%2fSomeWebApp%2fDefault.aspx%3faction%3dppr&action=ppr%3CScript%20%3Ealert(%22HelloSIG%22)%3C/Script%3E Error Date: [redacted] Error Message: A potentially dangerous Request.QueryString value was detected from the client (action="ppr<Script >alert("Hell..." Albeit a little late (going on 7+ years of .NET programming...), thanks for the warning Microsoft!

    Z B 3 Replies Last reply
    0
    • M MacSpudster

      I get an email whenever there's an error on my webapps. We recently initiated a service to do Red-Siren testing; e.g., testing for any security issues. Got an error message today. Of most interest, and danged funny at that, is the unedited, verbatim "Error Message" from Microsoft's lovely .NET Framework ... (emphasis added) URL: https : / / www.RedactedWebSite.com /SomeWebApp/ThatLoginPage.aspx?ReturnUrl=%2fSomeWebApp%2fDefault.aspx%3faction%3dppr&action=ppr%3CScript%20%3Ealert(%22HelloSIG%22)%3C/Script%3E Error Date: [redacted] Error Message: A potentially dangerous Request.QueryString value was detected from the client (action="ppr<Script >alert("Hell..." Albeit a little late (going on 7+ years of .NET programming...), thanks for the warning Microsoft!

      Z Offline
      Z Offline
      ziggyfish
      wrote on last edited by
      #2

      Its not .NET's fault, its actually a XSS attack, that the tool is testing for. What the tool is saying, is that you should validate the input before that URL has a chance to be generated. You can cause a lot of problem for your users if you have XSS vulnerabilities, its what virus writers use to spread the virus over the internet. You should raise this as a serious bug with the original developers.

      D 1 Reply Last reply
      0
      • M MacSpudster

        I get an email whenever there's an error on my webapps. We recently initiated a service to do Red-Siren testing; e.g., testing for any security issues. Got an error message today. Of most interest, and danged funny at that, is the unedited, verbatim "Error Message" from Microsoft's lovely .NET Framework ... (emphasis added) URL: https : / / www.RedactedWebSite.com /SomeWebApp/ThatLoginPage.aspx?ReturnUrl=%2fSomeWebApp%2fDefault.aspx%3faction%3dppr&action=ppr%3CScript%20%3Ealert(%22HelloSIG%22)%3C/Script%3E Error Date: [redacted] Error Message: A potentially dangerous Request.QueryString value was detected from the client (action="ppr<Script >alert("Hell..." Albeit a little late (going on 7+ years of .NET programming...), thanks for the warning Microsoft!

        Z Offline
        Z Offline
        ziggyfish
        wrote on last edited by
        #3

        Also they actually call this type of testing, Pen[etration] testing, never heard of Red-Siren testing.

        D M 2 Replies Last reply
        0
        • Z ziggyfish

          Its not .NET's fault, its actually a XSS attack, that the tool is testing for. What the tool is saying, is that you should validate the input before that URL has a chance to be generated. You can cause a lot of problem for your users if you have XSS vulnerabilities, its what virus writers use to spread the virus over the internet. You should raise this as a serious bug with the original developers.

          D Offline
          D Offline
          devvvy
          wrote on last edited by
          #4

          Ziggy - if the guy can't even distinguish whether this is a .NET problem or a scripting problem - it's unlikely he/she can/will be able to protect his/her apps/enterprise he/she is working for.

          dev

          Z M 2 Replies Last reply
          0
          • D devvvy

            Ziggy - if the guy can't even distinguish whether this is a .NET problem or a scripting problem - it's unlikely he/she can/will be able to protect his/her apps/enterprise he/she is working for.

            dev

            Z Offline
            Z Offline
            ziggyfish
            wrote on last edited by
            #5

            Agreed. However teaching people what that error message actually means, and what he needs to do to avoid those errors benefits all of us. XSS is possible in this site as well (example is this), so its not a common problem that every developer knows about.

            D 1 Reply Last reply
            0
            • Z ziggyfish

              Agreed. However teaching people what that error message actually means, and what he needs to do to avoid those errors benefits all of us. XSS is possible in this site as well (example is this), so its not a common problem that every developer knows about.

              D Offline
              D Offline
              devvvy
              wrote on last edited by
              #6

              reminds me olden days they used to say "COM is Love"

              dev

              1 Reply Last reply
              0
              • Z ziggyfish

                Also they actually call this type of testing, Pen[etration] testing, never heard of Red-Siren testing.

                D Offline
                D Offline
                devvvy
                wrote on last edited by
                #7

                firms i worked for our security teams hired outside consultancy specifically for pen-testing.

                dev

                1 Reply Last reply
                0
                • M MacSpudster

                  I get an email whenever there's an error on my webapps. We recently initiated a service to do Red-Siren testing; e.g., testing for any security issues. Got an error message today. Of most interest, and danged funny at that, is the unedited, verbatim "Error Message" from Microsoft's lovely .NET Framework ... (emphasis added) URL: https : / / www.RedactedWebSite.com /SomeWebApp/ThatLoginPage.aspx?ReturnUrl=%2fSomeWebApp%2fDefault.aspx%3faction%3dppr&action=ppr%3CScript%20%3Ealert(%22HelloSIG%22)%3C/Script%3E Error Date: [redacted] Error Message: A potentially dangerous Request.QueryString value was detected from the client (action="ppr<Script >alert("Hell..." Albeit a little late (going on 7+ years of .NET programming...), thanks for the warning Microsoft!

                  B Offline
                  B Offline
                  BotCar
                  wrote on last edited by
                  #8

                  Why is this double-posted?

                  M 1 Reply Last reply
                  0
                  • B BotCar

                    Why is this double-posted?

                    M Offline
                    M Offline
                    MacSpudster
                    wrote on last edited by
                    #9

                    Because I inadvertently doubled my espresso yesterday ... :-D

                    1 Reply Last reply
                    0
                    • D devvvy

                      Ziggy - if the guy can't even distinguish whether this is a .NET problem or a scripting problem - it's unlikely he/she can/will be able to protect his/her apps/enterprise he/she is working for.

                      dev

                      M Offline
                      M Offline
                      MacSpudster
                      wrote on last edited by
                      #10

                      People, get a clue!! It's a humor post, not of "Hey, I dunno what is happening here.". I am 100% knowing this is a scripting "error" (XSS) as such that the Pen(etration) / Red-Siren test has resulted in and not that of a ".NET error". The post is a jab at Microsoft .NET. Specifically, .NET is (like) HELL (figuratively speaking) to work in sometimes (... actually, much more than "sometimes"!!). :wtf: If some don't agree of the humor-angle, no apologies are offered for the faining upon anyone's sacred .NET altar. :wtf:

                      D 1 Reply Last reply
                      0
                      • Z ziggyfish

                        Also they actually call this type of testing, Pen[etration] testing, never heard of Red-Siren testing.

                        M Offline
                        M Offline
                        MacSpudster
                        wrote on last edited by
                        #11

                        Red-Siren testing is something I implemented at several Fortune 500 companies and many smaller companies. It's testing that seeks to reveal critical security issues in an OS, system, web app, application, or the occasional contract developer that picks their nose and doesn't dispose of the content upon their finger but continues typing ... all of which, when discovered, a "red-siren" type warning (akin to an actual red emergency light and siren on an emergency vehicle) is generated.

                        1 Reply Last reply
                        0
                        • M MacSpudster

                          People, get a clue!! It's a humor post, not of "Hey, I dunno what is happening here.". I am 100% knowing this is a scripting "error" (XSS) as such that the Pen(etration) / Red-Siren test has resulted in and not that of a ".NET error". The post is a jab at Microsoft .NET. Specifically, .NET is (like) HELL (figuratively speaking) to work in sometimes (... actually, much more than "sometimes"!!). :wtf: If some don't agree of the humor-angle, no apologies are offered for the faining upon anyone's sacred .NET altar. :wtf:

                          D Offline
                          D Offline
                          devvvy
                          wrote on last edited by
                          #12

                          lol sorry dude my mistake!

                          dev

                          1 Reply Last reply
                          0
                          Reply
                          • Reply as topic
                          Log in to reply
                          • Oldest to Newest
                          • Newest to Oldest
                          • Most Votes


                          • Login

                          • Don't have an account? Register

                          • Login or register to search.
                          • First post
                            Last post
                          0
                          • Categories
                          • Recent
                          • Tags
                          • Popular
                          • World
                          • Users
                          • Groups