Unencrypted __VIEWSTATE parameter in a DoD website

Disclosed: 2020-05-14 17:43:23 By miguel_santareno To deptofdefense
Medium
Vulnerability Details
Hi there i realise that the information passing to the server in the subdomain http://████████ can be seen without any encryption thought the __VIEWSTATE Parameter. To reduce the change of someone interception the information the parameter should be encrypted due to the sensivity of the information passing thought there. POC: Well this quiet easy to explore it. Go to the following website with burp turned on: url: https://█████/ Intercept the traffic and check the response from the __VIEWSTATE parameter and you will see the information passing in cleartext viewstate.jpg Recommendations. The __VIEWSTATE variable cipher is recommended in the application settings (web.config). References: http://msdn.microsoft.com/en-us/library/ms178199(v=vs.85).aspx https://www.acunetix.com/vulnerabilities/web/unencrypted-__viewstate-parameter Best Regards Miguel Santareno ## Impact It depends on the information passing around but for what can i see this is still a medium stuff
Actions
View on HackerOne
Report Stats
  • Report ID: 423118
  • State: Closed
  • Substate: resolved
  • Upvotes: 1
Share this report