Microsoft .NET Chart Control Information Disclosure
Systems Affected: .NET 4 - Microsoft Chart Control
Category: Information Disclosure
Author: Context Information Security Ltd
Reported to vendor: 3rd October 2010
Advisory Issued: 11th August 2011
Reference: MS11-066, CVE-2011-1977
The Microsoft Chart Control is vulnerable to an information disclosure vulnerability. By sending a specific GET request
to an application implementing the chart control, attackers could read arbitrary files on the system.
The Microsoft Chart Control plots graphs and with the default configuration stores those as image files in a directory
on the system. The graph images are retrieved using GET requests and a file path parameter.
When the control retrieves a request, it verifies that the requested file path lies within the allowed directory and if
so reads and returns the file’s contents. However, the verification process was found to be flawed, resulting in the
ability to traverse directories to load arbitrary files.
The Microsoft Chart Control is included in the .NET Framework 4 or can be downloaded separately for .NET 3.5
This vulnerability was found using the Context App Tool (CAT http://cat.contextis.com).
Microsoft .Net Framework 4
Microsoft advises users to patch the .Net Framework to the latest version. See the following Microsoft security
bulletin for more details:
3rd October 2010 – Vendor Notification
4th October 2010 – First Vendor Response
16th November 2010 – Vendor Confirms Vulnerability
9th August 2011 – Vendor Patch Released
Nico Leidecker and James Forshaw of Context Information Security Ltd
About Context Information Security
Context Information Security is an independent security consultancy specialising in both technical security and
information assurance services.
The company was founded in 1998. Its client base has grown steadily over the years, thanks in large part to personal
recommendations from existing clients who value us as business partners. We believe our success is based on the value
our clients place on our product-agnostic, holistic approach; the way we work closely with them to develop a tailored
service; and to the independence, integrity and technical skills of our consultants.
The company’s client base now includes some of the most prestigious blue chip companies in the world, as well as
The best security experts need to bring a broad portfolio of skills to the job, so Context has always sought to recruit
staff with extensive business experience as well as technical expertise. Our aim is to provide effective and practical
solutions, advice and support: when we report back to clients we always communicate our findings and recommendations in
plain terms at a business level as well as in the form of an in-depth technical report.
Email: disclosure () contextis com