Soroush Dalili (@irsdl) Blog

A web application security ninja 🥷, a semicolon enthusiast!

Skip to content
  • Home
  • Advisories
  • Privacy Policy
  • Bug Bounty Invites!
  • SecProject

My MDSec Blog Posts so far in 2020/2021!

Lately I have only published blog posts through the MDSec website. I thought it might be a good idea to link what I have published so far here as well:

  • NSA Meeting Proposal for ProxyShell (view PDF)
  • Covert Web Shells in .NET with Read-Only Web Paths (view PDF)
  • Analysis of CVE-2020-0605 – Code Execution using XPS Files in .NET (view PDF)
  • Introducing YSoSerial.Net April 2020 Improvements (view PDF)
  • A Security Review of SharePoint Site Pages (view PDF)
  • CVE-2020-0618: RCE in SQL Server Reporting Services (SSRS) (view PDF)
  • Code injection in Workflows leading to SharePoint RCE (CVE-2020-0646) (view PDF)

COVID-19 has sadly affected many if not all of us. I hope everyone remains safe and we can all carry on the normal life we had before this crisis. Hopefully I can then publish more blog posts here as well.

This entry was posted in My Advisories, Security Posts and tagged .Net Framework, asp.ne, code injection, covid-19, deserialisation, deserialization, Exploit, mdsec, sharepoint, ssrs, weblogs, website vulnerability, workflows, xps, ysoserial.net on October 31, 2020 by Soroush Dalili.

Post navigation

← File Upload Attack using XAMLX Files Thirteen Years On: Advancing the Understanding of IIS Short File Name (SFN) Disclosure! →
  • Twitter
  • GitHub
  • LinkedIn
  • MongoDB NoSQL Injection with Aggregation PipelinesJune 23, 2024
  • Cookieless DuoDrop: IIS Auth Bypass & App Pool Privesc in ASP.NET Framework (CVE-2023-36899 & CVE-2023-36560)August 8, 2023
  • Anchor Tag XSS Exploitation in Firefox with Target=”_blank”August 1, 2023
  • Thirteen Years On: Advancing the Understanding of IIS Short File Name (SFN) Disclosure!July 31, 2023
  • My MDSec Blog Posts so far in 2020/2021!October 31, 2020
  • File Upload Attack using XAMLX FilesSeptember 21, 2019
  • Uploading web.config for Fun and Profit 2August 15, 2019
  • IIS Application vs. Folder Detection During Blackbox TestingJuly 9, 2019
  • Danger of Stealing Auto Generated .NET Machine KeysMay 10, 2019
  • x-up-devcap-post-charset Header in ASP.NET to Bypass WAFs Again!May 4, 2019
  • Exploiting Deserialisation in ASP.NET via ViewStateApril 23, 2019
  • Yet Other Examples of Abusing CSRF in LogoutApril 23, 2019
  • How to win BIG and even more!April 17, 2019
  • Finding and Exploiting .NET Remoting over HTTP using DeserialisationMarch 26, 2019
  • More research on .NET deserializationDecember 19, 2018
  • Feel honoured to be there again after 8 years: Top 10 Web Hacking Techniques of 2017December 19, 2018
  • Story of my two (but actually three) RCEs in SharePoint in 2018December 19, 2018
  • ASP.NET resource files (.RESX) and deserialization issuesAugust 12, 2018
  • MS 2018 Q4 – Top 5 Bounty Hunter for 2 RCEs in SharePoint OnlineAugust 12, 2018
  • WAF Bypass Techniques – Using HTTP Standard and Web Servers’ BehaviourAugust 12, 2018

Blog Tags

  • .Net Framework
  • Anti-XSS bypass
  • AntiXSS bypass
  • ASP.NET
  • bug bounty
  • bugbounty
  • bypass
  • Challenge
  • deserialisation
  • deserialization
  • ecommerce
  • ExternalInterface
  • ExternalInterface.call
  • file upload
  • file upload bypass
  • file uploader bypass methods
  • file uploader security bypass
  • financial
  • flash
  • flash xss
  • guideline
  • iis
  • IIS File Extension Security Bypass
  • iis short file name
  • IIS Tilde bug
  • IIS tilde feature
  • IIS tilde vulnerability
  • jar protocol
  • machine.config
  • machinekey
  • penetration testing
  • RCE
  • request encoding
  • sharepoint
  • Short name scanner
  • SQL Injection
  • Unrestricted File Download
  • Unrestricted File Upload
  • viewstate
  • waf
  • WAF bypass
  • web.config
  • XSS
  • XSS Vulnerability
  • ysoserial.net

RSS REDDIT Web Security Research

  • arete | Fuzzing WebSockets for Server-Side Vulnerabilities April 30, 2025 /u/t0xodile
  • Python Dirty Arbitrary File Write to RCE via Writing Shared Object Files Or Overwriting Bytecode Files April 29, 2025 /u/siunam_321
  • Modern Cross-Site WebSocket Hijacking Exploitation April 22, 2025 /u/albinowax
  • Attacks via a New OAuth flow, Authorization Code Injection, and Whether HttpOnly, PKCE, and BFF Can Help April 10, 2025 /u/anador
  • GraphQL hacking: passing URL-encoded query parameters. March 30, 2025 /u/Moopanger
  • Next.js and the corrupt middleware: the authorizing artifact March 24, 2025 /u/albinowax
  • Next.js Authentication Bypass Vulnerability (CVE-2025-29927) Explained Simply March 23, 2025 /u/Available_Spell_5915
  • Discourse Backup Disclosure: Rails/nginx send_file Quirk March 20, 2025 /u/albinowax
  • SAML roulette: the hacker always wins March 18, 2025 /u/albinowax
  • Attempted Research in PHP Class Pollution February 27, 2025 /u/siunam_

RSS Reddit netsec Channel Feed

  • CVE-2024-11477- 7-Zip ZSTD Buffer Overflow Vulnerability - Crowdfense May 8, 2025
  • AI Slop Is Polluting Bug Bounty Platforms with Fake Vulnerability Reports May 7, 2025
  • The Path to Memory Safety is Inevitable May 7, 2025
  • Summarisation of Cross Session Activation / Kerberos relaying attacks May 7, 2025
  • Finding Vulnerable malloc Calls using Ghidra PCode Analysis May 7, 2025

RSS Exploit-DB Feed

  • [webapps] Casdoor 1.901.0 - Cross-Site Request Forgery (CSRF)
  • [webapps] Grokability Snipe-IT 8.0.4 - Insecure Direct Object Reference (IDOR)
  • [webapps] ERPNext 14.82.1 - Account Takeover via Cross-Site Request Forgery (CSRF)
  • [local] Microsoft Windows - XRM-MS File NTLM Information Disclosure Spoofing
  • [local] Daikin Security Gateway 14 - Remote Password Reset

Privacy Policy Proudly powered by WordPress