Rewterz Threat Advisory – CVE-2018-8256 & CVE-2018-8415 – Windows PowerShell Multiple Vulnerabilities
November 14, 2018Rewterz Threat Advisory – Microsoft Windows Server 2008 and Windows 7 multiple vulnerabilities
November 15, 2018Rewterz Threat Advisory – CVE-2018-8256 & CVE-2018-8415 – Windows PowerShell Multiple Vulnerabilities
November 14, 2018Rewterz Threat Advisory – Microsoft Windows Server 2008 and Windows 7 multiple vulnerabilities
November 15, 2018Microsoft .NET core is vulnerable to a security bypass due to improper input validation, that could lead to arbitrary file write.
IMPACT: NORMAL
PUBLISH DATE: 15-11-2018
OVERVIEW
A vulnerability has been reported in Microsoft .NET Core, which can be exploited by malicious people to manipulate certain data. This tampering error exists when .NET Core improperly handles specially crafted files (input validation error).
ANALYSIS
The An error related to the “ExtractRelativeToDirectory()” function can be exploited to write arbitrary files via a specially crafted file. Users of Microsoft .NET Core may suffer from a security-bypass attack in case of successful exploitation of this vulnerability.
Attackers bypassing certain security restrictions may perform unauthorized actions, write arbitrary files and directories to certain locations on a vulnerable system or launch other attacks. The manipulation with an unknown input leads to a privilege escalation vulnerability.
However, to exploit the vulnerability, an attacker must send a specially crafted file to a vulnerable system.
The security update fixes the vulnerability by ensuring that .NET Core properly handles files.
AFFECTED PRODUCTS
Microsoft .NET Core 2.1
UPDATES
The issue is fixed in the source code repository.
https://github.com/dotnet/corefx/commit/a0fcd23ace1c8d692988cd0da4391cf7bf5e0ce6
If you think you’re the victim of a cyber-attack, immediately send an email to soc@rewterz.com.