CVE-2024-28698

9.8 CRITICAL

📋 TL;DR

CVE-2024-28698 is a critical directory traversal vulnerability in CSLA .NET's MobileFormatter component that allows remote attackers to execute arbitrary code by sending crafted scripts. This affects all applications using CSLA .NET versions before 8.0. The vulnerability enables complete system compromise through path traversal leading to code execution.

💻 Affected Systems

Products:
  • Marimer LLC CSLA .NET
Versions: All versions before 8.0
Operating Systems: Windows, Linux, macOS (any OS running .NET)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects any application using CSLA .NET's MobileFormatter component, particularly web applications and services.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote unauthenticated attacker gains full system control, executes arbitrary code, installs malware, exfiltrates data, and pivots to other systems.

🟠

Likely Case

Remote attacker exploits vulnerable web applications to execute code, compromise application servers, and access sensitive data.

🟢

If Mitigated

With proper network segmentation and least privilege, impact limited to isolated application environment with minimal lateral movement.

🌐 Internet-Facing: HIGH - Directly exploitable via network requests to vulnerable applications without authentication.
🏢 Internal Only: HIGH - Internal applications remain vulnerable to internal attackers or compromised accounts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available in research articles. Simple HTTP requests can trigger the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CSLA .NET 8.0 and later

Vendor Advisory: https://github.com/MarimerLLC/csla/pull/3552

Restart Required: Yes

Instructions:

1. Update all CSLA .NET packages to version 8.0 or later. 2. Rebuild and redeploy affected applications. 3. Restart application services.

🔧 Temporary Workarounds

Disable MobileFormatter

all

Remove or disable MobileFormatter component if not required

Modify application configuration to disable MobileFormatter serialization

Input Validation Filter

all

Implement strict input validation for all MobileFormatter requests

Add request filtering middleware to reject suspicious paths

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable applications
  • Deploy WAF rules to block directory traversal patterns in requests

🔍 How to Verify

Check if Vulnerable:

Check CSLA .NET package version in project files or assembly version. Versions < 8.0 are vulnerable.

Check Version:

Check .csproj files for PackageReference to CSLA or examine assembly version at runtime.

Verify Fix Applied:

Confirm CSLA .NET version is 8.0+ and test MobileFormatter with known exploit patterns.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file path patterns in HTTP requests
  • Multiple failed attempts to access system directories
  • Unexpected process execution from web application

Network Indicators:

  • HTTP requests containing '../' patterns to MobileFormatter endpoints
  • Unusual outbound connections from application servers

SIEM Query:

source="web_logs" AND (uri="*MobileFormatter*" AND (uri="*../*" OR uri="*..\\*"))

🔗 References

📤 Share & Export