I had some feedback from some people with threats and vulnerabilities related to websites returning HTTP 500 response codes. In fact, the advice is to take all possible measures so that the server does not select 500 (that is, an extensive check input form) which is ok.
However, the council also suggested that attempts to compromise security using tools such as pasting a tag into a random query string that causes ASP.NET to validate or manipulate widgets should not return HTTP 500. Obviously, the behavior of the inline structure is to interpret the request and possibly throw custom errors to the page, but even that will return a 500 response code.
So, I am after some thoughts on how to approach this. Is there a way to configure the application at the .NET or IIS level to return HTTP 200 when 500 is raised? Or will this become a global.asax coding exercise in one of the application events? Are there any other implications for consideration?
By the way, the justification on the security side is that applications that return HTTP 500 can be considered as “low-hanging fruits” by bots that randomly scan for vulnerabilities and cause further malicious activity. Im’s attempts are not personally convinced that changing the response codes provides any real security gains, but I am happy to help the advice of professionals.
source
share