Microsoft released a blog this week which I don’t think people have fully understood the implications of, but it’s great research and a great attack by the threat actor.
I think it’s highly likely multiple threat actors will now jump on this, it’s even automatable.
The attack:
1) take a web.config file. They’re really easy to find.
2) POST request to RCE in IIS
The architecture of .net means this is surprisingly easy to do and you don’t patch your way out of it.
I’ve bookmarked this thread so it doesn’t auto delete the toots, put it that way. You could just automate spraying the internet with this one.
@GossiTheDog o_O what in hades is this abomination?
@GossiTheDog Ah viewstate, best of intentions and the worst of implementations
@buherator @GossiTheDog There's long list of "default" secret keys used for JWT and session cookies collected in various github projects. Similarly on Ruby on Rails, Django the secret session key can lead to RCE through unmarshalling. JWT can give you admin role etc.
@GossiTheDog MS Defender alerts if it finds configs with those leaked keys. Quite useful
@buherator @GossiTheDog Yep, quite a few CTF repos in here.