Miggo Logo

CVE-2021-24112: .NET Core Graphics File Parsing Remote Code Execution Vulnerability

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.72268%
CWE
-
Published
5/24/2022
Updated
1/30/2023
KEV Status
No
Technology
TechnologyC#

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
System.Drawing.Commonnuget>= 4.0.0, < 4.7.24.7.2
System.Drawing.Commonnuget>= 5.0.0, < 5.0.35.0.3

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from unsafe image parsing in System.Drawing.Common's Unix implementation (libgdiplus). The primary attack vector would be through image loading APIs like Image.FromStream and Bitmap constructors that process untrusted streams. These functions interface with native code where memory corruption occurs. While exact patch details aren't visible, Microsoft's advisory explicitly calls out graphics file parsing as the vulnerable path, and these are the canonical entry points for such operations in the affected library.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* r*mot* *o** *x**ution vuln*r**ility *xists w**n p*rsin* **rt*in typ*s o* *r*p*i*s *il*s. T*is vuln*r**ility only *xists on syst*ms runnin* on M**OS or Linux. T*is *V* I* is uniqu* *rom *V*-****-*****.

Reasoning

T** vuln*r**ility st*ms *rom uns*** im*** p*rsin* in Syst*m.*r*win*.*ommon's Unix impl*m*nt*tion (li***iplus). T** prim*ry *tt**k v**tor woul* ** t*rou** im*** lo**in* *PIs lik* Im***.*romStr**m *n* *itm*p *onstru*tors t**t pro**ss untrust** str**ms.