Microsoft ASP.NET Security Vulnerability
An attacker using this vulnerability can request and download files within an ASP.NET Application like the web.config file (which often contains sensitive data). Attacker exploiting this vulnerability can also decrypt data sent to the client in an encrypted state (like ViewState data within a page).
Workaround details for asp.net applications:
DotNetNuke specific instructions to apply workaround:
We are monitoring the Microsoft advisory for updates and will be scheduling a round of updates for all servers as soon as it has been made available to the public. In the meantime the above listed workarounds will protect your applications from this vulnerability.
If you have any questions, please submit a support ticket.
Tuesday, September 21, 2010