"Second Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NET" Jonathan Birch

Collapse
X
 
  • Time
  • Show
Clear All
new posts
  • number6
    404 Image not found
    • Apr 2019
    • 2172

    #1

    "Second Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NET" Jonathan Birch

    Second Breakfast: Implicit and Mutation-Based Serialization Vulnerabilities in .NET
    Jonathan Birch, Principal Security Software Engineer, Microsoft, He/Him
    Exploit | 45

    Exploits of insecure serialization leading to remote code execution have been a common attack against .NET applications for some time. But it's generally assumed that exploiting serialization requires that an application directly uses a serializer and that it unsafely reads data that an attacker can tamper with. This talk demonstrates attacks that violate both of these assumptions. This includes serialization exploits of platforms that don't use well-known .NET serializers and methods to exploit deserialization even when the serialized data cannot be tampered with. Remote code execution vulnerabilities in MongoDB, LiteDB, ServiceStack.Redis, RavenDB, MartenDB, JSON.Net and the .NET JavaScriptSerializer are all demonstrated. Techniques to both scan for and mitigate these vulnerabilities are also discussed.

    Jonathan Birch is a Principal Security Software Engineer for Microsoft. He hacks Office. His previous talks include "Host/Split: Exploitable Antipatterns in Unicode Normalization" at Black Hat 2019 and "Dangerous Contents - Securing .NET Deserialization" at BlueHat 2017.

    https://infosec.exchange/@seibai

    REFERENCES:
    "Are You My Type? Breaking .net Sandboxes Through Serialization", James Forshaw, Black Hat 2012
    "Friday the 13th JSON Attacks", Alvaro Muñoz & Oleksandr Mirosh, Black Hat 2017
    See also: https://github.com/pwntester/ysoserial.net for useful payload generators.​
Working...