.NET Serialization: Detecting and defending vulnerable endpoints

D195407e71e25241001971f9fa5cca45?s=47 Alvaro
April 06, 2018

.NET Serialization: Detecting and defending vulnerable endpoints

2016 was the year of Java deserialization apocalypse. Although Java Deserialization attacks were known for years, the publication of the Apache Commons Collection Remote Code Execution gadget (RCE from now on) finally brought this forgotten vulnerability to the spotlight and motivated the community to start finding and fixing these issues. .NET is next in line; formatters such as BinaryFormatter and NetDataContractSerializer are known to share similar mechanics which make them potentially vulnerable to similar RCE attacks. However, as we saw with Java before, the lack of RCE gadgets led some software vendors to not take this issue seriously. In this talk, we will analyze .NET serializers including third party JSON parsers for potential RCE vectors. We will provide real-world examples of vulnerable code and more importantly, we will review how these vulnerabilities were detected and fixed in each case.

D195407e71e25241001971f9fa5cca45?s=128

Alvaro

April 06, 2018
Tweet