Description
The System.Web class in the XSP for ASP.NET server 1.1 through 2.0 in Mono does not properly verify local pathnames, which allows remote attackers to (1) read source code by appending a space (%20) to a URI, and (2) read credentials via a request for Web.Config%20.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by jose.palanco · textremotelinux
https://www.exploit-db.com/exploits/29302
References (20)
Core 20
Core References
Third Party Advisory vendor-advisory
x_refsource_gentoo
http://security.gentoo.org/glsa/glsa-200701-12.xml
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23597
Third Party Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2006/5099
Various Sources vendor-advisory
x_refsource_suse
http://lists.suse.com/archive/suse-security-announce/2007-Jan/0002.html
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/2082
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2092
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/454962/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1017430
Mailing List vendor-advisory
x_refsource_fedora
http://fedoranews.org/cms/node/2400
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23462
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23727
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23779
Patch, Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2006:234
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23776
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/21687
Exploit x_refsource_misc
http://www.eazel.es/advisory007-mono-xsp-source-disclosure-vulnerability.html
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23435
Exploit, Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23432
Mailing List vendor-advisory
x_refsource_fedora
http://fedoranews.org/cms/node/2401
Patch vendor-advisory
x_refsource_ubuntu
http://www.ubuntu.com/usn/usn-397-1
Scores
EPSS
0.1502
EPSS Percentile
94.7%
Details
Status
published
Products (3)
mono/xsp
1.1
mono/xsp
1.2.1
mono/xsp
2.0
Published
Dec 21, 2006
Tracked Since
Feb 18, 2026