2 min read
|
Saved February 14, 2026
|
Copied!
Do you care about this?
Researchers found a vulnerability in the .NET Framework, dubbed SOAPwn, that allows attackers to exploit SOAP messages to execute arbitrary code in various applications, including Barracuda and Ivanti. Microsoft has chosen not to fix it, citing that it stems from application design flaws. Some affected software has released patches, but Umbraco 8 remains vulnerable since it reached end-of-life.
If you do, here's more
Recent research has revealed a significant vulnerability in the .NET Framework, termed SOAPwn, which allows attackers to exploit enterprise applications for remote code execution. WatchTowr Labs identified this "invalid cast vulnerability," affecting products like Barracuda Service Center RMM, Ivanti Endpoint Manager, and Umbraco 8. Given the widespread use of .NET, more applications could be vulnerable. The research was presented by security researcher Piotr Bazydlo at the Black Hat Europe conference.
The vulnerability arises from how applications handle Simple Object Access Protocol (SOAP) messages, particularly through Web Services Description Language (WSDL) imports. Attackers can manipulate .NET Framework HTTP client proxies to execute arbitrary code by injecting controlled URLs. For instance, using a URL like "file://<attacker-controlled input>" can lead to unauthorized file writes and code execution. In one scenario, a hacker could direct a SOAP request to an SMB share they control, potentially capturing NTLM authentication challenges.
Bazydlo also pointed out a more dangerous exploitation method tied to the ServiceDescriptionImporter class, which fails to validate URLs from generated HTTP client proxies. By providing a malicious WSDL file, an attacker can drop web shells or PowerShell scripts into vulnerable applications, gaining remote access. Microsoft has not issued a fix for this vulnerability, arguing that it results from application behavior rather than a flaw in the framework itself. However, Barracuda and Ivanti have patched their affected products, while Umbraco 8 remains vulnerable as it reached its end-of-life in February 2025.
Questions about this article
No questions yet.