Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Iran’s Infy APT resurfaces with new malware activity after years of silence

‘It felt so wrong’: Colin Angle on iRobot, the FTC, and the Amazon deal that never was

New York Governor Kathy Hochul signs RAISE Act regulating AI safety

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » .NET SOAPwn flaw opens door to file writes and remote code execution via malformed WSDL
Identity

.NET SOAPwn flaw opens door to file writes and remote code execution via malformed WSDL

userBy userDecember 10, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

December 10, 2025Ravi LakshmananEnterprise security/web services

New research reveals exploit primitives in the .NET Framework that could be leveraged against enterprise-grade applications to enable remote code execution.

WatchTowr Labs, which codenamed the “invalid cast vulnerability” SOAPwn, said the issue affects Barracuda Service Center RMM, Ivanti Endpoint Manager (EPM), and Umbraco 8. However, given the popularity of .NET, the number of affected vendors will likely be longer-term.

The findings were announced today by watchTowr security researcher Piotr Bazydlo at the Black Hat Europe security conference in London.

Essentially, SOAPwn allows attackers to execute arbitrary code in products built on the foundation of .NET by abusing Web Services Description Language (WSDL) imports and HTTP client proxies due to errors in the way Simple Object Access Protocol (SOAP) messages are handled.

“It is typically exploitable via a SOAP client, especially if it is created dynamically from an attacker-controlled WSDL,” Bazydlo said.

cyber security

As a result, the .NET Framework HTTP client proxy can be manipulated to use the file system handler and pass something like “file://” as a URL to the SOAP client proxy to accomplish writing an arbitrary file, which can ultimately lead to code execution. Even worse, since the attacker controls the complete write path, it could be used to overwrite existing files.

In a hypothetical attack scenario, an attacker could leverage this behavior to provide a Universal Naming Convention (UNC) path (e.g., “file://attacker.server/poc/poc”) and a SOAP request would be written to an SMB share under their control. This allows an attacker to capture and decrypt NTLM challenges.

That’s not all. This research also found that applications that use the ServiceDescriptionImporter class to generate HTTP client proxies from WSDL files can have a more powerful exploitation vector that can be weaponized by leveraging the fact that the URLs used in the generated HTTP client proxies are not validated.

This technique allows an attacker to execute remote code by providing a vulnerable application with a URL pointing to a WSDL file that they manage and dropping a fully functional ASPX web shell or an additional payload such as a CSHTML web shell or PowerShell script.

After responsible disclosures in March 2024 and July 2025, Microsoft chose not to fix the vulnerability, stating that the issue was due to an issue or behavior in the application and that “users should not use untrusted input that can generate and execute code.”

cyber security

This finding indicates that expected behavior in common frameworks can be a potential exploit path leading to NTLM relaying and arbitrary file writes. This issue has since been resolved in Barracuda Service Center RMM version 2025.1.1 (CVE-2025-34392, CVSS score: 9.8) and Ivanti EPM version 2024 SU4 SR1 (CVE-2025-13659, CVSS score: 8.8).

“Instead of sending SOAP requests over HTTP, it is possible to write them to a file in a SOAP proxy,” Bazydlo said. “This often results in remote code execution via WebShell uploads or PowerShell script uploads. The exact impact depends on the application using the proxy class.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMarco Rubio bans Calibri font at State Department for being too DEI
Next Article Overview Energy wants to beam energy from space to existing solar power plants
user
  • Website

Related Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

December 21, 2025

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

December 20, 2025

Russian-linked hackers use Microsoft 365 device code phishing to take over accounts

December 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Iran’s Infy APT resurfaces with new malware activity after years of silence

‘It felt so wrong’: Colin Angle on iRobot, the FTC, and the Amazon deal that never was

New York Governor Kathy Hochul signs RAISE Act regulating AI safety

US Department of Justice charges $54 for ATM jackpotting scheme using Ploutus malware

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.