Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 158935 - dev-lang/mono XSP ASP.NET Server sourcecode disclosure vulnerability (CVE-2006-6104)
Summary: dev-lang/mono XSP ASP.NET Server sourcecode disclosure vulnerability (CVE-200...
Status: RESOLVED DUPLICATE of bug 157288
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://eazel.es/advisory007-mono-xsp-...
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2006-12-23 10:50 UTC by Carsten Lohrke (RETIRED)
Modified: 2006-12-23 14:50 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Carsten Lohrke (RETIRED) gentoo-dev 2006-12-23 10:50:45 UTC
Attackers use source code disclosure attacks to try to obtain the source code of server-side applications. The basic role of Web servers is to serve files as requested by clients. Files can be static, such as image and HTML files, or dynamic, such as ASPX, ASHX, ASCX, ASAX, webservices like ASMX files and any language supported by Mono like: C#, boo, nemerle, vb files: .cs, .boo, vb, .n, ... When the browser requests a dynamic file, the Web server first executes the file and then returns the result to the browser. Hence, dynamic files are actually code executed on the Web server.

Using a source code disclosure attack, an attacker can retrieve the source code of server-side file. Obtaining the source code of server-side files grants the attacker deeper knowledge of the logic behind the Web application, how the application handles requests and their parameters, the structure of the database, vulnerabilities in the code and source code comments. Having the source code, and possibly a duplicate application to test on, helps the attacker to prepare an attack on the application.

An attacker can cause source code disclosure using adding %20 (space char) after the uri, for example
http://www.server.com/app/Default.aspx%20

Update: is also possible retrieve Web.Config file. This file contains sensible informatin like credentials. 


http://eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html

patch: http://eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.patch
Comment 1 Jurek Bartuszek (RETIRED) gentoo-dev 2006-12-23 14:50:30 UTC

*** This bug has been marked as a duplicate of 157288 ***