First published: Wed Aug 27 2008(Updated: )
Request Validation (aka the ValidateRequest filters) in ASP.NET in Microsoft .NET Framework without the MS07-040 update does not properly detect dangerous client input, which allows remote attackers to conduct cross-site scripting (XSS) attacks, as demonstrated by a query string containing a "</" (less-than slash) sequence.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows NT | =2003-gold | |
Microsoft Windows NT | =2003-sp1 | |
Microsoft Windows NT | =2003-sp1 | |
Microsoft Windows NT | =2003-sp2 | |
Microsoft Windows NT | =2003-sp2 | |
Microsoft Windows NT | =2003-sp2 | |
Microsoft Windows NT | =xp-gold | |
Microsoft Windows NT | =xp-sp3 | |
Microsoft Windows 2000 | =sp4 | |
Microsoft Windows Vista | ||
Microsoft Windows XP | =sp2 | |
Microsoft Windows XP | =sp2 | |
Microsoft .NET Framework | =2.0 | |
Microsoft Windows NT | =2008 | |
Microsoft Windows NT | =2008 | |
Microsoft Windows NT | =2008 | |
Microsoft .NET Framework | =1.1-sp1 | |
Microsoft Windows NT | =xp-gold | |
Microsoft Windows NT | =xp-gold | |
Microsoft .NET Framework | =1.0-sp3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3842 has a high severity rating due to its potential to allow cross-site scripting (XSS) attacks.
To fix CVE-2008-3842, apply the MS07-040 update or otherwise ensure your ASP.NET application properly validates input.
CVE-2008-3842 affects Microsoft .NET Framework versions 1.0, 1.1, and 2.0 if not patched.
CVE-2008-3842 can facilitate cross-site scripting (XSS) attacks by not properly handling dangerous input.
Not all Windows versions are vulnerable to CVE-2008-3842; primarily older versions without the necessary updates are at risk.