• Toll-free  888-665-8637
  • International  +1 717-220-0012
Welcome Guest! To enable all features please Login or Register.

Notification

Icon
Error

HPros
#1 Posted : Sunday, March 2, 2008 1:08:14 PM(UTC)
HPros

Rank: Member

Joined: 1/30/2008(UTC)
Posts: 215

We're getting this every day or so now. It looks like someone is trying to enter a URL in a text box we leave for general instructions. What does this message actually mean? Is BV blocking all url entries or is something else nefarious going on? This is on our logo items site the text boxes are on most product pages. The instructions are often used to give us a nudge on special requirements.




Code:

A potentially dangerous Request.Form value was detected from the client (ctl00$MainContentHolder$VariantsDisplay$inputTemplate5$InputTextBox="...ing. <a href="http://tech...").[ at System.Web.HttpRequest.ValidateString(String s, String valueName, String collectionName) at System.Web.HttpRequest.ValidateNameValueCollection(NameValueCollection nvc, String collectionName) at System.Web.HttpRequest.get_Form() at System.Web.HttpRequest.get_HasForm() at System.Web.UI.Page.GetCollectionBasedOnMethod(Boolean dontReturnNull) at System.Web.UI.Page.DeterminePostBackMode() at System.Web.UI.Page.ProcessRequestMain(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) at System.Web.UI.Page.ProcessRequest(Boolean includeStagesBeforeAsyncPoint, Boolean includeStagesAfterAsyncPoint) at System.Web.UI.Page.ProcessRequest() at System.Web.UI.Page.ProcessRequestWithNoAssert(HttpContext context) at System.Web.UI.Page.ProcessRequest(HttpContext context) at ASP.bvmodules_producttemplates_bvc_2004_layout_product_aspx.ProcessRequest(HttpContext context) at System.Web.HttpApplication.CallHandlerExecutionStep.System.Web.HttpApplication.IExecutionStep.Execute() at System.Web.HttpApplication.ExecuteStep(IExecutionStep step, Boolean& completedSynchronously) ]
Andy Miller
#2 Posted : Sunday, March 2, 2008 4:21:57 PM(UTC)
Andy Miller

Rank: Member

Joined: 11/5/2003(UTC)
Posts: 2,136

Was thanked: 1 time(s) in 1 post(s)
This page has an good explanation of the message and describes a way of stopping the message. Be sure to heed the warning.


http://www.cryer.co.uk/brian/mswinswdev/ms_vbnet_server_error_potentially_dangerous.htm
Andy Miller
Structured Solutions

Shipper 3 - High Velocity Shipment Processing
HPros
#3 Posted : Sunday, March 2, 2008 8:18:53 PM(UTC)
HPros

Rank: Member

Joined: 1/30/2008(UTC)
Posts: 215

Andy, are we saying that in it's current form BV would not be secure with text boxes? I'm a little confused, shouldn't this be disabled by default in the application? Is it already or are there additional recommendations from BV?
CorneliuTusnea
#4 Posted : Sunday, March 2, 2008 10:01:34 PM(UTC)
CorneliuTusnea

Rank: Member

Joined: 8/17/2006(UTC)
Posts: 681

HPros,
The error that you get is a standard validation that is applied by ASP.Net to try to avoid Cross Site Scriping (XSS).
Disabling the error is very simple to do however you open your site to a bunch of potential cross site scripting issues.
The proper way to protect against this is to correctly sanitize inputs and always encode outputs and not using the HttpUtility.HtmlEncode but using the much better AntiXss.HtmlEncode method written by the Microsoft Security Team.
However BVC does not use this anywhere. Actually very few sites do this properly and it's a big issue that can create lots of different attacks on your site mostly from an attacker towards an admin.
Unless BV does a fix (which implies a very large code change) I would leave the validation in place and accept the potential errors than remove the validations.
Regards,
Corneliu.
http://www.bestgames.com.au
http://www.bestchess.com.au



BV Product Links, Details and Signatures: Improve your customer experience:

http://www.acorns.com.au/projects/bv/quicklink/

CorneliuTusnea
#5 Posted : Sunday, March 2, 2008 10:06:39 PM(UTC)
CorneliuTusnea

Rank: Member

Joined: 8/17/2006(UTC)
Posts: 681

Oh,
I forgot, they don't try to enter a URL (e.g. http://www.blahblah.com) they try to enter HTML code:
< a href=.. which your normal user would not enter anyway. That clearly looks more like an attack to me than your average user.
Regards,
Corneliu.
http://www.bestgames.com.au
http://www.bestchess.com.au



BV Product Links, Details and Signatures: Improve your customer experience:

http://www.acorns.com.au/projects/bv/quicklink/

HPros
#6 Posted : Sunday, March 2, 2008 10:41:49 PM(UTC)
HPros

Rank: Member

Joined: 1/30/2008(UTC)
Posts: 215

Corneliu, so essentially it's safe and secure just not ideal? I'd rather just have it squash any of that input entirely because as you said it's clearly non-legit.

What's bugging me is I cannot see the full address of the attempt..the bv error log truncates that data. We're can I find it in the actual application?
CorneliuTusnea
#7 Posted : Monday, March 3, 2008 12:18:48 AM(UTC)
CorneliuTusnea

Rank: Member

Joined: 8/17/2006(UTC)
Posts: 681

You can't. It's not BV the ones that truncates it. It's the ASP and it does it for your own safety.

Regards,
Corneliu.
http://www.bestgames.com.au
http://www.bestchess.com.au



BV Product Links, Details and Signatures: Improve your customer experience:

http://www.acorns.com.au/projects/bv/quicklink/

HPros
#8 Posted : Monday, March 3, 2008 9:02:17 AM(UTC)
HPros

Rank: Member

Joined: 1/30/2008(UTC)
Posts: 215

I think these are actually bots trying to find text boxes on blogs to be honest. They see a text box and try to post then move on. We don't carry card numbers online - they are immediately removed if they were ever there at all so there isn't much to grab anyway.
Forum Jump  
You cannot post new topics in this forum.
You cannot reply to topics in this forum.
You cannot delete your posts in this forum.
You cannot edit your posts in this forum.
You cannot create polls in this forum.
You cannot vote in polls in this forum.

©2024 Develisys. All rights reserved.
  • Toll-free  888-665-8637
  • International  +1 717-220-0012