﻿<?xml version="1.0" encoding="utf-8"?><rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:media="http://search.yahoo.com/mrss/" xmlns:feedburner="http://rssnamespace.org/feedburner/ext/1.0" version="2.0"><channel><title>Intersoft Community - WebGrid Enterprise - Need confirmation for WebGrid to be XSS safe</title><link>http://www.intersoftsolutions.com/Community/WebGrid/Need-confirmation-for-WebGrid-to-be-XSS-safe/</link><description /><generator>http://www.intersoftsolutions.com</generator><language>en</language><copyright>Copyright 2002 - 2015 Intersoft Solutions Corp. All rights reserved.</copyright><ttl>60</ttl><item><title>Need confirmation for WebGrid to be XSS safe</title><link>http://www.intersoftsolutions.com/Community/WebGrid/Need-confirmation-for-WebGrid-to-be-XSS-safe/</link><pubDate>Wed, 30 Nov 2011 02:44:21 GMT</pubDate><dc:creator>handy@intersoftpt.com</dc:creator><category>WebGrid</category><category>XSS</category><category>cross-site scripting</category><category>penetration test</category><category>pentest</category><category>pen-test</category><description>&lt;p&gt;Hello,&lt;/p&gt;&lt;p&gt;I just want to update the information. Even though WebGrid 8 is not included in this released but we have enhanced the security to eliminate XSS by using JSOn. To use this feature, simply put &lt;span style="color: rgb(63, 63, 63); font-family: 'segoe ui', arial, verdana, tahoma; font-size: 12px; line-height: 18px; background-color: rgb(255, 255, 255); "&gt;ContolDataTransferFormat to JSon.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;font class="Apple-style-span" style="color: rgb(63, 63, 63); font-family: 'segoe ui', arial, verdana, tahoma; "&gt;&lt;span style="font-size: 12px; line-height: 18px; "&gt;Regards,&lt;br /&gt;Handy&lt;/span&gt;&lt;/font&gt;&lt;/p&gt;</description></item><item><title>Need confirmation for WebGrid to be XSS safe</title><link>http://www.intersoftsolutions.com/Community/WebGrid/Need-confirmation-for-WebGrid-to-be-XSS-safe/</link><pubDate>Tue, 13 Sep 2011 00:40:14 GMT</pubDate><dc:creator>handy@intersoftpt.com</dc:creator><category>WebGrid</category><category>XSS</category><category>cross-site scripting</category><category>penetration test</category><category>pentest</category><category>pen-test</category><description>&lt;p&gt;Hi Eric,&lt;/p&gt;&lt;p&gt;Yes, That is correct. However, you would need understand if you need to upgrade to our WebGrid 8 in order to have this feature. Remember that we already discontinued to support WebGrid 6.&lt;/p&gt;
&lt;p&gt;Regards,&lt;br /&gt;Handy&lt;/p&gt;</description></item><item><title>Need confirmation for WebGrid to be XSS safe</title><link>http://www.intersoftsolutions.com/Community/WebGrid/Need-confirmation-for-WebGrid-to-be-XSS-safe/</link><pubDate>Mon, 12 Sep 2011 06:29:00 GMT</pubDate><dc:creator>Eric</dc:creator><category>WebGrid</category><category>XSS</category><category>cross-site scripting</category><category>penetration test</category><category>pentest</category><category>pen-test</category><description>&lt;p&gt;Hi Handy,&lt;/p&gt;&lt;p&gt;Your answer sounds a little funny, but the roadmap attachment fully answers my question.&lt;/p&gt;
&lt;p&gt;From what is said there: Next release of WebUI Studio 2011 R2 / WebUI Studio for ASP.NET includes WebGrid Enterprise 8 and will come out this month and has "improved security by eliminating XSS exploit through the use of JSON as the control data format".&lt;/p&gt;
&lt;p&gt;Let me know if I misunderstood anything.&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Thanks,&lt;/p&gt;
&lt;p&gt;Eric&lt;/p&gt;</description></item><item><title>Need confirmation for WebGrid to be XSS safe</title><link>http://www.intersoftsolutions.com/Community/WebGrid/Need-confirmation-for-WebGrid-to-be-XSS-safe/</link><pubDate>Sun, 11 Sep 2011 23:20:01 GMT</pubDate><dc:creator>handy@intersoftpt.com</dc:creator><category>WebGrid</category><category>XSS</category><category>cross-site scripting</category><category>penetration test</category><category>pentest</category><category>pen-test</category><description>&lt;p /&gt;&lt;p&gt;Hi Eric,&lt;/p&gt;
&lt;p&gt;Thank you for your patience. The upcoming WebGrid will eliminate the XSS completely. You can see the following details in our roadmap. &lt;/p&gt;
&lt;p&gt;Regards,&lt;br /&gt;Handy&lt;/p&gt;
&lt;p /&gt;</description></item><item><title>Need confirmation for WebGrid to be XSS safe</title><link>http://www.intersoftsolutions.com/Community/WebGrid/Need-confirmation-for-WebGrid-to-be-XSS-safe/</link><pubDate>Fri, 09 Sep 2011 04:05:12 GMT</pubDate><dc:creator>handy@intersoftpt.com</dc:creator><category>WebGrid</category><category>XSS</category><category>cross-site scripting</category><category>penetration test</category><category>pentest</category><category>pen-test</category><description>&lt;p&gt;Hello Eric,&lt;/p&gt;&lt;p&gt;Ok, please give us a little time to consult with our developer teams.&lt;/p&gt;
&lt;p&gt;Regards,&lt;br /&gt;Handy&lt;/p&gt;</description></item><item><title>Need confirmation for WebGrid to be XSS safe</title><link>http://www.intersoftsolutions.com/Community/WebGrid/Need-confirmation-for-WebGrid-to-be-XSS-safe/</link><pubDate>Thu, 08 Sep 2011 06:20:10 GMT</pubDate><dc:creator>Eric</dc:creator><category>WebGrid</category><category>XSS</category><category>cross-site scripting</category><category>penetration test</category><category>pentest</category><category>pen-test</category><description>&lt;p&gt;Hi,&lt;br /&gt;&lt;br /&gt;We are using WebGrid version 6.0.7200.220, Intersoft framework version 3.0.5000.771.&lt;br /&gt;An external penetration test found the following issue, which we need to fix.&lt;br /&gt;&lt;/p&gt;&lt;br /&gt;&lt;blockquote style="padding-left: 10px; margin: 0px 0px 0px 5px; border-left: 1px solid rgb(204, 204, 204);"&gt;&lt;strong&gt;XML Content injection&lt;/strong&gt;&lt;br /&gt;Requests to return ***** data via XML are not handled properly by the application. It is possible for an attacker to create a Cross-Site Scripting style request which modifies the content which a user receives in the response from the application.&lt;br /&gt;The more serious possibility of Cross-Site Scripting could not be achieved during testing, chiefly due to the input-filtering of the .NET framework, making this a low risk issue.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Detailed description and Rationale&lt;/strong&gt;&lt;br /&gt;An AJAX request from the page at the URL *********.aspx back to itself requests XML which is parsed by the client-side javascript and then rendered to the page. It is the arguments in this request which can be modified to include XML which is returned in the response. The data must be double URL encoded to make it through to the response, however this is no problem for an attacker. XSS was not achieved during testing, however this may be due only to the built-in protection mechanisms of the .NET framework, which is a public target for attackers to devise methods for circumventing, and therefore not a mechanism that the application should rely on for security if possible.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Recommended Countermeasures&lt;/strong&gt;&lt;br /&gt;Alter the application code that handles the AJAX request to correctly sanitise all inputs of invalid characters and data before returning it to the user's browser.&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;After asking for more detailed information I got this:&lt;br /&gt;&lt;br /&gt;&lt;blockquote style="padding-left: 10px; margin: 0px 0px 0px 5px; border-left: 1px solid rgb(204, 204, 204);"&gt;&lt;strong&gt;XML injection&lt;/strong&gt;&lt;br /&gt;The page at *********.aspx accepts user input that is echoed back in the page response, although cross-site scripting was not possible. The fix is to include some server side logic that parses all user controllable input and rejects any unexpected values.&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;I have no additional information, so I cannot even say which part is responsible. We do not use XML post data in our application, therefore this can only be caused by either of the two controls we are using. One of them is WebGrid.&lt;br /&gt;&lt;br /&gt;As you see, we need a confirmation that WebGrid does &lt;em&gt;"correctly sanitise all inputs"&lt;/em&gt;, maybe even in written form. We cannot verify this ourself easily without full source code. So can you confirm this for the used WebGrid version? If no, can you confirm that for any later version? If no version supports this yet, can you guarantee that this will be fixed in any future version and guarantee a release date until this will get fixed?&lt;br /&gt;&lt;br /&gt;So what we need would be a confirmation that your control is XSS safe. You might need to consult your management and development departments for a thorough answer.&lt;br /&gt;&lt;br /&gt;Thanks,&lt;br /&gt;Eric&lt;br /&gt;&lt;br /&gt;</description></item></channel></rss>