A vulnerability in .Net Core library can let the attackers allowing malicious program by evading security software eyes.
This vulnerability was due to path traversal bug in .NET Core library which allows malicious garbage collector (GC) DLLs can be loaded by low privilege users on the system.
This vulnerability is discovered by Paul Laîné and mentioned this vulnerability is possible due to two reasons.
- .NET Core allows custom GC DLLs to use.
- The environment variable “COMPlus_GCName” used for specifying custom GC for .NET is not sanitized. Due to this any path traversal strings provided in GC will not be filtered.
This bug affects the .NET Core (3.1.x versions) stable release. A fix for this vulnerability is not available yet. Attackers may exploit this bug and can execute malicious programs evading the detection by security softwares.
Exploiting this bug is clearly provided in a blog post by Bleeping Computer.
For more related content follow us on Twitter, Telegram, Facebook.