How To Review Visual Basic WebClasses (IIS Applications) for CSSI Vulnerability (253155)
The information in this article applies to:
- Microsoft Visual Basic Learning Edition for Windows 6.0
- Microsoft Visual Basic Professional Edition for Windows 6.0
- Microsoft Visual Basic Enterprise Edition for Windows 6.0
This article was previously published under Q253155 SUMMARY
This article describes how to identify and correct Visual Basic WebClass (IIS Applications) that are susceptible to cross-site scripting security issues (CSSI). Only input that is not correctly validated or formatted makes your application vulnerable to attack.
This article focuses on Visual Basic 6.0 Webclass functionality (for example, replacement tags). For general guidelines regarding Active Server Pages (ASP) code, please see the following article in the Microsoft Knowledge Base:
253119 How To Review ASP Code for CSSI Vulnerability
REFERENCES
For more information, see the following advisory from the Computer Emergency Response Team (CERT) at Carnegie Mellon University:
For additional information, click the article numbers below
to view the articles in the Microsoft Knowledge Base:
252985 How To Prevent Cross-Site Scripting Security Issues
253119 How To Review ASP Code for CSSI Vulnerability
253121 How To Review MTS/ASP Code for CSSI Vulnerability
253120 How To Review Visual InterDev Generated Code for CSSI Vulnerability
253117 Preventing Internet Explorer and Outlook Express Cross-Site Scripting Security Issues
Modification Type: | Minor | Last Reviewed: | 7/15/2004 |
---|
Keywords: | kbhowto KB253155 kbAudDeveloper |
---|
|