CVE-2024-28698
📋 TL;DR
CVE-2024-28698 is a critical directory traversal vulnerability in CSLA .NET's MobileFormatter component that allows remote attackers to execute arbitrary code by sending crafted scripts. This affects all applications using CSLA .NET versions before 8.0. The vulnerability enables complete system compromise through path traversal leading to code execution.
💻 Affected Systems
- Marimer LLC CSLA .NET
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote unauthenticated attacker gains full system control, executes arbitrary code, installs malware, exfiltrates data, and pivots to other systems.
Likely Case
Remote attacker exploits vulnerable web applications to execute code, compromise application servers, and access sensitive data.
If Mitigated
With proper network segmentation and least privilege, impact limited to isolated application environment with minimal lateral movement.
🎯 Exploit Status
Public exploit details available in research articles. Simple HTTP requests can trigger the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: CSLA .NET 8.0 and later
Vendor Advisory: https://github.com/MarimerLLC/csla/pull/3552
Restart Required: Yes
Instructions:
1. Update all CSLA .NET packages to version 8.0 or later. 2. Rebuild and redeploy affected applications. 3. Restart application services.
🔧 Temporary Workarounds
Disable MobileFormatter
allRemove or disable MobileFormatter component if not required
Modify application configuration to disable MobileFormatter serialization
Input Validation Filter
allImplement strict input validation for all MobileFormatter requests
Add request filtering middleware to reject suspicious paths
🧯 If You Can't Patch
- Implement strict network segmentation to isolate vulnerable applications
- Deploy WAF rules to block directory traversal patterns in requests
🔍 How to Verify
Check if Vulnerable:
Check CSLA .NET package version in project files or assembly version. Versions < 8.0 are vulnerable.
Check Version:
Check .csproj files for PackageReference to CSLA or examine assembly version at runtime.
Verify Fix Applied:
Confirm CSLA .NET version is 8.0+ and test MobileFormatter with known exploit patterns.
📡 Detection & Monitoring
Log Indicators:
- Unusual file path patterns in HTTP requests
- Multiple failed attempts to access system directories
- Unexpected process execution from web application
Network Indicators:
- HTTP requests containing '../' patterns to MobileFormatter endpoints
- Unusual outbound connections from application servers
SIEM Query:
source="web_logs" AND (uri="*MobileFormatter*" AND (uri="*../*" OR uri="*..\\*"))