От: | cadet354 | my twitter | |
Дата: | 20.09.10 08:32 | ||
Оценка: |
The attack that was shown in the public relies on a feature in ASP.NET that allows files (typically javascript and css) to be downloaded, and which is secured with a key that is sent as part of the request. Unfortunately if you are able to forge a key you can use this feature to download the web.config file of an application (but not files outside of the application). We will obviously release a patch for this — until then the above workaround closes the attack vector.