Microsoft Updates .NET Core, Issues Remote Code Execution Security Advisory
Microsoft issued security updates for .NET Core while releasing a security advisory about a remote code execution vulnerability.
“Microsoft is aware of a remote code execution vulnerability exists in .NET software when the software fails to check the source markup of an XML file,” the company said in a July 14 blog post. “An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user.
“A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to an ASP.NET Core application, or other application that parses certain types of XML.”
The updates — .NET Core 2.1.20 and .NET Core 3.1.6 — restrict the types that are allowed to be present in the XML payload in order to address the vulnerability.
Additional fixes in the release cover a variety of issues in CoreCLR (the runtime for .NET Core), CoreFX (the foundational class libraries for .NET Core) and ASP.NET Core, the web framework.
Getting the update requires downloading .NET Core 3.1.6 and .NET Core SDK and/or .NET Core 2.1.20 and .NET Core SDK,
The fix will be baked in to a future update of the Visual Studio IDE.
More information about the vulnerability can be found in CVE-2020-1147
David Ramel is an editor and writer for Converge360.
Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.