{"vuid":"VU#455604","idnumber":"455604","name":"Microsoft .NET Framework contains a cross-site scripting vulnerability","keywords":["Microsoft",".NET Framework","cross-site scripting","xss","ms06-oct"],"overview":"The Microsoft .NET Framework contains a cross-site scripting vulnerability that may allow an attacker to read or modify data in web pages and cookies.","clean_desc":"The Microsoft .NET Framework is a managed code programming model for Microsoft Windows operating systems. Microsoft ASP.NET is a technology designed to allow programmers to create dynamic web sites and web applications. A cross-site scripting vulnerability exists in the .NET Framework 2.0. This vulnerability occurs due to improper validation of HTTP request values.","impact":"An attacker may be able to obtain sensitive data from a user of a web site running a vulnerable version of the .NET Framework. Depending on the nature of the web site, this data may include passwords, credit card numbers, and any arbitrary information provided by the user. Likewise, information stored in cookies could be stolen or corrupted.","resolution":"Update\nMicrosoft has released an update to address this issue. See Microsoft Security Bulletin MS06-056 for more details.","workarounds":"Workarounds for administrators According to Microsoft, setting the AutoPostBack property to false may mitigate the affects of this vulnerability. See Microsoft Knowledgebase article 328923 for more information about the AutoPostBack property. Workarounds for users Do not follow untrusted hyperlinks, especially if they are sent through email or instant messenger programs. Disable JavaScript. See the Securing your Web Browser document for instructions. Note that disabling JavaScript may reduce the functionality and features provided by some web sites. Type URLs directly in the web browser's address bar, or use bookmarks to navigate to web sites. See the Cross-Site Scripting Vulnerabilities document for general information.","sysaffected":"","thanks":"Microsoft credits Jaswinder Hayre for reporting this vulnerability.","author":"This document was written by Ryan Giobbi.","public":["http://www.microsoft.com/technet/security/bulletin/ms06-056.mspx","http://www.cert.org/tech_tips/securing_browser/"],"cveids":["CVE-2006-3436"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2006-10-10T18:19:18Z","publicdate":"2006-10-10T00:00:00Z","datefirstpublished":"2006-10-10T23:36:02Z","dateupdated":"2007-06-26T19:48:41Z","revision":29,"vrda_d1_directreport":"0","vrda_d1_population":"4","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"15","cam_impact":"3","cam_easeofexploitation":"15","cam_attackeraccessrequired":"4","cam_scorecurrent":"0.961875","cam_scorecurrentwidelyknown":"1.215","cam_scorecurrentwidelyknownexploited":"2.2275","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.961875,"vulnote":null}