Classic ASP Design Mistakes

OWASP Code Review Guide Table of Contents

Overview
There are several issues inherent to classic ASP pages that may lead to security issues. We are talking about beginner mistakes or code misuse. The following examples will give you a good idea of what is being discussed. All of these examples are based on common findings through experience of ASP testing.

ASP Pages Execution Order Issues
First of all let's explain the processing levels on ASP pages. ASP pages are executed in the following way:


 * 1) Server Side Includes. First, the interpreter adds to the current file the text of all the files in include sentences and process it as if ti was a single file.
 * 2) Server Side VBSCript Code. Second, the VBScript in <% and %> code is executed.
 * 3) Client Side JAvascript/VBScript Code. Finally once the page is completely loaded in the browser, JavaScript code is executed.

This might be obvious, however ignoring this order might lead to severe security issues. Here are some examples

Wrong dynamic inclusion of files.
<% If User = "Admin" Then %> <% Else %> <% End If %> The previous code will add the content of both files to the ASP page execution as SSI are executed first than ASP code, it is possible that the page is displayed correctly due to the "If" sentence, however all the code will be processed, this might lead to race condition or undesired execution of functions.

HTML and JavaScript comments do not skip execution of ASP code
 var x = 'Hello, '; //<%= "Debug: This is the DB password: " & DBUserPassword %> alert (x + "Juan"); If you are proficient in ASP technology the result of the example above would be clear, however, many developers cannot tell the final output

 var x = 'Hello, '; //Debug: This is the DB password: Password alert (x + "Juan");

Above shows that sensitive information the commented out code, is disclosed in HTML or JavaScript comments

Using JavaScript to drive ASP functionality
Yes, this is not possible, but that is another reason to look for it.

var name; name = prompt ("Enter your UserName:"); <%      If name != "user" Then 'The user is an admin Role = "Admin" Else Role = "User" End IF  %>

The code above shall grant Admin privileges every time to the logged user as, as we saw before, ASP code is executed first. Besides, there is no sharing of variables between JavaScript and ASP code.

Another example:

<%@ Language=VBScript %>  if (confirm('go to yahoo?')){ <% response.redirect "http://www.yahoo.com/" %> }else { <% response.redirect "http://www.altavista.com/" %> }

You will always go to Yahoo and will never be displayed with a prompt, code within <% %> is executed first.

Stopping execution with Response.End
Lack of this sentence might end up in execution of undesired code. <%  If Not ValidInfo Then %>  alert("Information is invalid"); location.href="default.asp"; <%  End if Call UpdateInformationFunction %>

In example above, the "UpdateInformationFunction" is called all the time regardless of the "ValidInfo" variable value as ASP code is executed first than JavaScript, so ASP code is executed in server and the output is sent to Browser, then JavaScript is executed. That means that is required a Response.End to stop execution server side.

Java classes hosted in MS Java Virtual Machine
These classes can be called from ASP pages so you should look also for insecure functionality within such classes. This is an example:

<% Dim date Set date = GetObject("java:java.util.Date") %> The date is <%= date.toString %>

Not using Option Explicit
Mistyped variables might lead to race conditions on business logic. This option will force the user to declare all the used variables, it will add a bit of performance as well.

IsClientConnected property
This property determines if the client has disconnected from the server since the last Response.Write. This property is particularly useful to prevent the server from continuing execution of long pages after an unexpected disconnect. As you might figured out this is very useful property to avoid DoS attacks to the Server and DB in long execution pages.