soroush.secproject.comSoroush Dalili (@irsdl) Blog | A web application security ninja ?, a semicolon enthusiast!

soroush.secproject.com Profile

Soroush.secproject.com is a subdomain of secproject.com, which was created on 2008-12-14,making it 15 years ago.

Discover soroush.secproject.com website stats, rating, details and status online.Use our online tools to find owner and admin contact info. Find out where is server located.Read and write reviews or vote to improve it ranking. Check alliedvsaxis duplicates with related css, domain relations, most used words, social networks references. Go to regular site

soroush.secproject.com Information

HomePage size: 174.898 KB
Page Load Time: 0.701639 Seconds
Website IP Address: 172.67.194.221

soroush.secproject.com Similar Website

Cybersecurity Blog - Network Security Blog | RSI Security
blog.rsisecurity.com
Application Security Testing Tool | Software Security Testing Solutions | Checkmarx
info.checkmarx.com
Security Innovation Application and Cybersecurity Blog
blog.securityinnovation.com
Custom Web Application and Desktop Application Development | J Street Technology
mvpwww.jstreettech.com
Web 2.0 Application Research, Social Networking Research | ApplicationsGuide.com | Actiance Security
research.actiance.com
Fretmentor's Blog | For the Banjo, Guitar, Mandolin, Fiddle & Music Enthusiast
blogs.fretmentor.com
Application Development Application Development
ctis.okcareertech.org
Application Modernization | Application Development | Micro Focus
online.microfocus.com
The Web Application Security Consortium / FrontPage
projects.webappsec.org
Kids Card Application - Kids Card Application
kidcard.portauthority.org
Application Form - Account Application
registration.sportingindex.com
Ninja Kiwi Merch Store – Ninja Kiwi Store
store.ninjakiwi.com
UECU Membership Application UECU Membership Application
onlineapps.uecu.org
Blog | Security Guard Management System - Blog | Security Guard Management System |
blog.guardspro.com
Ninja HQ – The Newsletter Ninja Learning
ninjahq.newsletterninja.net

soroush.secproject.com PopUrls

Soroush Dalili (@irsdl) Blog | A web application security ninja ...
https://soroush.secproject.com/
2014 | Soroush Dalili (@irsdl) Blog
https://soroush.secproject.com/blog/2014/
Soroush Dalili (@irsdl) Blog
https://soroush.secproject.com/blog/author/soroush/
ExternalInterface | Soroush Dalili (@irsdl) Blog
https://soroush.secproject.com/blog/tag/externalinterface/
June | 2012 | Soroush Dalili (@irsdl) Blog
https://soroush.secproject.com/blog/2012/06/
Java | Soroush Dalili (@irsdl) Blog
https://soroush.secproject.com/blog/tag/java/
March | 2013 | Soroush Dalili (@irsdl) Blog
https://soroush.secproject.com/blog/2013/03/
Challenge | Soroush Dalili (@irsdl) Blog
https://soroush.secproject.com/blog/tag/challenge/
iis | Soroush Dalili (@irsdl) Blog
https://soroush.secproject.com/blog/tag/iis/
Soroush Dalili (@irsdl) - Personal Blog | Page 4
https://soroush.secproject.com/blog/category/securityposts/0/0/page/7/0/page/4/
Soroush Dalili (@irsdl) - سروش دلیلی | Page 4
https://soroush.secproject.com/blog/category/securityposts/0/0/0/page/4/
Soroush Dalili (@irsdl) - سروش دلیلی
https://soroush.secproject.com/blog/category/securityposts/0/0/page/8/0/
Soroush Dalili (@irsdl) - سروش دلیلی | Page 14
https://soroush.secproject.com/blog/category/securityposts/0/0/page/14/
My Advisories | Soroush Dalili (@irsdl) Blog
https://soroush.secproject.com/blog/category/myadvisories/

soroush.secproject.com Httpheader

Date: Tue, 14 May 2024 18:25:05 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Vary: Accept-Encoding,Cookie
Last-Modified: Sat, 27 Apr 2024 10:41:17 GMT
Cache-Control: max-age=3, must-revalidate
Expires: Tue, 14 May 2024 18:25:08 GMT
CF-Cache-Status: DYNAMIC
Report-To: "endpoints":["url":"https:\\/\\/a.nel.cloudflare.com\\/report\\/v4?s=yzG3LO%2BK8Kg7Imbi3VrxKMWY2RwWAAkQJOkoS01t9BbwGlOrvVNhr4xrGq3zkcTAPRzJ%2BWLf1TOQ5h8KpMjsf2dc8GAXnSQN%2B%2BNOzq5KYjJuWZsz%2BQGNKr8oKupWMfFOM7UciTk9X8Q%2B"],"group":"cf-nel","max_age":604800
NEL: "success_fraction":0,"report_to":"cf-nel","max_age":604800
Server: cloudflare
CF-RAY: 883cedcad9c59405-LHR
alt-svc: h3=":443"; ma=86400

soroush.secproject.com Meta Info

charset="utf-8"/
content="width=device-width" name="viewport"/
content="max-image-preview:large" name="robots"/
content="WordPress 6.5.2" name="generator"/
content="Site Kit by Google 1.125.0" name="generator"/
content="f242X22aKoqFZVDSKxtIYkW7c2cZLDQ07iXy4CQMF3s" name="google-site-verification"/
content="ca-host-pub-2644536267352236" name="google-adsense-platform-account"/
content="sitekit.withgoogle.com" name="google-adsense-platform-domain"/

soroush.secproject.com Html To Plain Text

Soroush Dalili (@irsdl) Blog A web application security ninja ?, a semicolon enthusiast! Menu Home Advisories Privacy Policy Bug Bounty Invites! Work Cookieless DuoDrop: IIS Auth Bypass & App Pool Privesc in ASP.NET Framework (CVE-2023-36899 & CVE-2023-36560) Introduction In modern web development, while cookies are the go-to method for transmitting session IDs, the .NET Framework also provides an alternative: encoding the session ID directly in the URL. This method is useful to clients that do not support cookies. An example of this URL encoding can be seen here: https://[targetdomain]/(S(aaaaaaaaaaaaaaaaaaaaaaaa))/default.aspx This technique is known as the cookieless” feature in the .NET Framework: https://learn.microsoft.com/en-us/previous-versions/dotnet/articles/aa479314(v=msdn.10) Many developers and security testers overlook this option, primarily because of its rarity in real-world applications. Historically, this has turned it into a goldmine for discovering client-side vulnerabilities, such as session fixation, session hijacking, HTML injection, and cross-site scripting. Additionally, this feature can be leveraged to circumvent path-based firewall rules that aren’t configured to recognize the cookieless approach. For a deeper dive into security issues stemming from the use of cookieless sessions, consider these references: https://blog.isec.pl/all-is-xss-that-comes-to-the-net/ (A highly recommended read) https://learn.microsoft.com/en-us/archive/msdn-magazine/2009/march/security-briefs-protect-your-site-with-url-rewriting https://www.sans.org/blog/session-attacks-and-asp-net-part-2/ Importantly, due to inherent security concerns, the cookieless feature was omitted from .NET Core and subsequent .NET versions. You can learn more about this decision in the following discussions: https://github.com/dotnet/aspnetcore/issues/37978 https://github.com/dotnet/AspNetCore.Docs/blob/main/aspnetcore/fundamentals/app-state.md However, let’s not forget the vast number of web applications still humming along on the classic .NET Framework (with the capital ‘F’)! Finding the vulnerability I was initially trying to find a new method to improve my IIS Short File Name Disclosure technique. As part of this, I realised that the cookieless part can be used twice within the path, and I quickly wrote a Twitter (X) post about how WAFs can be potentially bypassed using this: https://twitter.com/irsdl/status/1640390106312835072 However, later on I identified a strange anomaly when the cookieless pattern was repeated twice. This resulted in two vulnerabilities reported to Microsoft as their impact and the exploitation were different: IIS restricted path bypass leading to potential authentication and path-filtration bypass Application Pool confusion leading to potential privilege escalations Microsoft addressed both of these issues as part of one patch under CVE-2023-36899 . I got the following comment from Microsoft when I was trying to see why one of them was assessed as a duplicate reducing the bounty: While it’s not technically a dupe from your side, it is from ours because the same patch fixes both thing, although it’s by accident rather than deliberation. IIS Restricted Path Bypass The cookieless feature of .NET Framework could be abused to access protected directories or those blocked by URL filters in IIS. For instance, on the victim.com website, consider: The page: /webform/protected/target1.aspx within the /protected/ directory that enforces Basic authentication. The page: /webform/bin/target2.aspx that was temporarily moved to the /bin/ folder, making it inaccessible. Normally, accessing the pages through these URLs would be blocked in IIS: https: // victim . com / webform / protected / target1 . aspx https: // victim . com / webform / bin / target2 . aspx However, the cookieless feature can be exploited to access these pages with the following patterns: https: // victim . com / webform / (S(X)) / prot / (S(X))ected / target1 . aspx https: // victim . com / webform / (S(X)) / b / (S(X)) in/ target2 . aspx Here is how IIS was configured as an example to set authentication for the /protected/ path: When trying the standard approach, IIS authentication for the /protected/ path behaves as expected, redirecting unauthorized users to the login page: Still, the bypass technique allows access without authentication, using the Anonymous user. This can sometimes lead to errors if the system expects a specific profile: The target1.aspx code was: Here I am, I am a protected page, how can you be here?! You username is: % = HttpContext.Current.User.Identity.Name % The root cause: The vulnerability stems from the way cookieless paths are rewritten in the .NET Framework. The following code was responsible for the final rewrite: https://referencesource.microsoft.com/#System.Web/HttpResponse.cs,50b59e7205970b81 internal String RemoveAppPathModifier ( string virtualPath) { if (String. IsNullOrEmpty (_appPathModifier)) return virtualPath; int pos = virtualPath. IndexOf (_appPathModifier, StringComparison.Ordinal); if (pos = 0 || virtualPath[pos - 1 ] != ’/’ ) return virtualPath; return virtualPath. Substring ( 0 , pos - 1 ) + virtualPath. Substring (pos + _appPathModifier.Length); } The RemoveAppPathModifier method used by the RemoveCookielessValuesFromPath method of the CookielessHelperClass class as can be seen here: https://referencesource.microsoft.com/#System.Web/Security/CookielessHelper.cs,113 By the time the function is invoked, the initial cookieless value is already removed. Due to this behavior, the path doesn’t adhere to restriction rules, bypassing authentication or filter checks. Therefore, it changes the /prot/(S(X))ected/ path to /protected/ facilitating the observed bypasses. A screenshot, provided below, captures the RemoveAppPathModifier method in action during the debugging of the .NET Framework: Application Pool Confusion Another notable issue involves how IIS manages Application Pools, potentially leading to privilege escalations or security bypasses. It’s possible to manipulate the cookieless feature in .NET Framework to compel an IIS application to run using its parent’s Application Pool instead of its own. To illustrate: The root ( / ) of the website is running with the DefaultAppPool Application Pool The /classic/ application uses the .NET v4.5 Classic Application Pool The /classic/nodotnet/ application uses the NoManagedCodeClassic Application Pool, which doesn’t support Managed Code. A C# file named AppPoolPrint.aspx , accessible across all the above applications, reveals the current Application Pool name: % @ Page Language = "C#" % % string appPoolName = System.Environment. GetEnvironmentVariable ( "APP_POOL_ID" ); Response. Write ( "App Pool Name: " + appPoolName); % Based on the regular structure, accessing this page would result in: / AppPoolPrint . aspx - DefaultAppPool / classic / AppPoolPrint . aspx - . NET v4 . 5 Classic / classic / nodotnet / AppPoolPrint . aspx - Error : 404 Not Found ( as Managed Code isn ’t supported) However, by using the cookieless pattern twice, we can run this page using its parent Application Pool: / ( S ( X )) / ( S ( X )) / classic / AppPoolPrint . aspx - DefaultAppPool / ( S ( X )) / ( S ( X )) / classic / nodotnet / AppPoolPrint . aspx - DefaultAppPool / classic / ( S ( X )) / ( S ( X )) / nodotnet / AppPoolPrint . aspx - . NET v4 . 5 Classic This allows even the pages within /classic/nodotnet/ (which shouldn’t execute Managed Code) to run the ASPX page using their parent’s Application Pools. This behavior can lead to privilege escalation on IIS. Update 10/08/2023 A new variant after the CVE-2023-36899 patch has been reported to Microsoft. This variant operates only on specific files, and I cannot discuss it in further detail at the moment. Furthermore, the patch only disabled the aggressive path replacement by default configuration. Thus, it’s possible to reintroduce the problematic behavior using the...

soroush.secproject.com Whois

Domain Name: SECPROJECT.COM Registry Domain ID: 1532989380_DOMAIN_COM-VRSN Registrar WHOIS Server: whois.cloudflare.com Registrar URL: http://www.cloudflare.com Updated Date: 2022-07-12T21:30:41Z Creation Date: 2008-12-14T19:42:47Z Registry Expiry Date: 2027-12-14T19:42:47Z Registrar: CloudFlare, Inc. Registrar IANA ID: 1910 Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited Name Server: ALINA.NS.CLOUDFLARE.COM Name Server: ART.NS.CLOUDFLARE.COM DNSSEC: signedDelegation DNSSEC DS Data: 2371 13 2 0C7A54331A7422E3129EF81924D6D60BFF8A4A66DE4C740B0297438565A07975 >>> Last update of whois database: 2024-05-17T20:53:26Z <<<