Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wq34-7f4g-953v

Опубликовано: 08 дек. 2025
Источник: github
Github: Прошло ревью
CVSS4: 7.2

Описание

Csla affected by Remote Code Execution via WcfProxy (NetDataContractSerializer)

Impact

Versions of CSLA .NET prior to version 6 allow the use of WcfProxy. WcfProxy uses the NetDataContractSerializer (NDCS) which has known vulnerabilities that can allow remote execution of code during deserialization. NDCS itself is considered obsolete, and you should avoid using WcfProxy or upgrade to CSLA 6 or higher where this issue does not exist.

Patches

CSLA .NET version 6 and higher do not use WCF or NetDataContractSerializer.

Workarounds

If you are using a version CSLA .NET older than version 6, you should stop using WcfProxy in your data portal configuration. Doing this avoids the use of WCF and the NetDataContractSerializer, avoiding the vulnerability.

Пакеты

Наименование

Csla

nuget
Затронутые версииВерсия исправления

< 6.0.0

6.0.0

EPSS

Процентиль: 64%
0.00468
Низкий

7.2 High

CVSS4

Дефекты

CWE-502

Связанные уязвимости

nvd
2 месяца назад

CSLA .NET is a framework designed for the development of reusable, object-oriented business layers for applications. Versions 5.5.4 and below allow the use of WcfProxy. WcfProxy uses the now-obsolete NetDataContractSerializer (NDCS) and is vulnerable to remote code execution during deserialization. This vulnerability is fixed in version 6.0.0. To workaround this issue, remove the WcfProxy in data portal configurations.

EPSS

Процентиль: 64%
0.00468
Низкий

7.2 High

CVSS4

Дефекты

CWE-502