Cross Site Scripting - Newbie Question

Cross Site Scripting - Newbie Question

am 16.03.2006 20:04:56 von Steve Ray

Guys

I've been informed today that one of my websites (at work) is allowing CSS.
Apart from Sp'ing and HF'ing the server is there a IIS security tool I can
install on Server 2003 that will prevent all known forms of attacks on the
box, such as a security roll up tool that used to exist for Server 2000

In anticipation

---------
We don't stop playing because we get old
We get old because we stop playing

Re: Cross Site Scripting - Newbie Question

am 16.03.2006 22:41:02 von DFS

Steve Ray wrote:
> I've been informed today that one of my websites (at work) is
> allowing CSS. Apart from Sp'ing and HF'ing the server is there a IIS
> security tool I can install on Server 2003 that will prevent all
> known forms of attacks on the box, such as a security roll up tool
> that used to exist for Server 2000

Why are they allowing Cross Site Scripting? If you are the server admin then
put your foot down!
Otherwise ASP.NET has a default block for any form values that have anything
looking like javascript. Try exploiting the site yourself and see if you can
do it. If you can then you can send them a very stiff email with a demo
saying that you will terminate their account unless they fix the problem.

Re: Cross Site Scripting - Newbie Question

am 17.03.2006 23:27:49 von Chris Priede

Hi,

Steve Ray wrote:
> I've been informed today that one of my websites (at work) is allowing
> CSS. Apart from Sp'ing and HF'ing the server is there a IIS security tool
> I can install on Server 2003 ...

One doesn't fix cross-site scripting vulnerabilities (the preferred acronym
is XSS, as CSS stands for something else) by doing something to the server.
Instead, one fixes it in the coding of the affected page(s).

XSS potential is created through lousy server-side code (ASP[.NET], PHP,
Perl, whatever), which can be manipulated to inject HTML in your page. The
risk exists in any web page that takes a POST or GET variable and somehow
includes its content in the response (confirmation, link target, etc.). For
more information, read:

http://www.cgisecurity.com/articles/xss-faq.shtml

As Leon pointed out, ASP.NET attempts to block the potential by default.
This protection may be turned off by setting ValidateRequest to false in the
application's web.config file. If your site contains any ASP.NET, you may
want to check your web.config files -- however, be aware many applications
require request validation off for intended functionality. Having
validation turned off doesn't necessarily make the application
exploitable -- only responsible for doing its own checking.

What you really need to do is identify the pages that are exploitable and
get them fixed. If they are part of a third party web application (e.g.
forums, shopping carts), check for a newer version or contact the author.


--
Chris Priede