Rapid7 Vulnerability & Exploit Database

ASP.NET Serialization - Windows Timeout command (Binarry Formatter and Xaml Serializer)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

ASP.NET Serialization - Windows Timeout command (Binarry Formatter and Xaml Serializer)

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
01/01/2017
Created
07/25/2018
Added
06/27/2018
Modified
06/27/2018

Description

Asp.Net Serialization problems are a subset of injection problem, in which the process is tricked into calling external processes of the attacker's choice through the injection of control-plane data into the data plane.

Asp.Net Serialization attacks take two forms:

  • An attacker can change the command that the program executes: the attacker explicitly controls what the command is.
  • An attacker can change the environment in which the command executes: the attacker implicitly controls what the command means.

In this case we are primarily concerned with the first scenario, in which an attacker explicitly controls the command that is executed. Asp.Net Serialization vulnerabilities of this type occur when:

  1. Data enters the application from an untrusted source.
  2. The data is part of a string that is executed as a command by the application.
  3. By executing the command, the application gives an attacker a privilege or capability that the attacker would not otherwise have.

Solution(s)

  • aspnetserialization-aspnetserialization-r02

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;