Critical severity9.8NVD Advisory· Published Jul 22, 2024· Updated Apr 15, 2026
CVE-2024-28698
CVE-2024-28698
Description
Directory Traversal vulnerability in Marimer LLC CSLA .Net before 8.0 allows a remote attacker to execute arbitrary code via a crafted script to the MobileFormatter component.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
CslaNuGet | < 5.5.4 | 5.5.4 |
CslaNuGet | >= 6.0.0, < 8.0.0 | 8.0.0 |
CslaNuGet | >= 7.0.0, < 8.0.0 | 8.0.0 |
Patches
52dd9b1fc2e0df3a5c3474974#4133 Backfit of : Prevent use of .. or : in file path #3552 (#4144)
1 file changed · +4 −1
Source/Csla/Reflection/MethodCaller.cs+4 −1 modified@@ -252,8 +252,11 @@ public static Type GetType(string typeName, bool throwOnError, bool ignoreCase) if (splitName.Length > 2) { - var asm = AssemblyLoadContext.Default.LoadFromAssemblyPath(AppContext.BaseDirectory + splitName[1].Trim() + ".dll"); + var path = AppContext.BaseDirectory + splitName[1].Trim() + ".dll"; + if (path.Contains("..") || path.Contains(':')) + throw new TypeLoadException(path); + var asm = AssemblyLoadContext.Default.LoadFromAssemblyPath(path); return asm.GetType(splitName[0].Trim()); } else
8fbdd8c773bf#4133 Backfit of : Prevent use of .. or : in file path #3552 for v6.x (#4145)
1 file changed · +4 −1
Source/Csla/Reflection/MethodCaller.cs+4 −1 modified@@ -252,8 +252,11 @@ public static Type GetType(string typeName, bool throwOnError, bool ignoreCase) if (splitName.Length > 2) { - var asm = AssemblyLoadContext.Default.LoadFromAssemblyPath(AppContext.BaseDirectory + splitName[1].Trim() + ".dll"); + var path = AppContext.BaseDirectory + splitName[1].Trim() + ".dll"; + if (path.Contains("..") || path.Contains(':')) + throw new TypeLoadException(path); + var asm = AssemblyLoadContext.Default.LoadFromAssemblyPath(path); return asm.GetType(splitName[0].Trim()); } else
445bc609bc11#4133 Backfit of : Prevent use of .. or : in file path #3552 (#4138)
1 file changed · +5 −1
Source/Csla.Shared/Reflection/MethodCaller.cs+5 −1 modified@@ -234,7 +234,11 @@ public static Type GetType(string typeName, bool throwOnError, bool ignoreCase) string[] splitName = typeName.Split(','); if (splitName.Length > 2) { - var asm = AssemblyLoadContext.Default.LoadFromAssemblyPath(AppContext.BaseDirectory + splitName[1].Trim() + ".dll"); + var path = AppContext.BaseDirectory + splitName[1].Trim() + ".dll"; + if (path.Contains("..") || path.Contains(':')) + throw new TypeLoadException(path); + + var asm = AssemblyLoadContext.Default.LoadFromAssemblyPath(path); return asm.GetType(splitName[0].Trim()); } else
2c32a5748a0aMerge pull request #3552 from rockfordlhotka/3551-assemblyload
1 file changed · +4 −1
Source/Csla/Reflection/MethodCaller.cs+4 −1 modified@@ -252,8 +252,11 @@ public static Type GetType(string typeName, bool throwOnError, bool ignoreCase) if (splitName.Length > 2) { - var asm = AssemblyLoadContext.Default.LoadFromAssemblyPath(AppContext.BaseDirectory + splitName[1].Trim() + ".dll"); + var path = AppContext.BaseDirectory + splitName[1].Trim() + ".dll"; + if (path.Contains("..") || path.Contains(':')) + throw new TypeLoadException(path); + var asm = AssemblyLoadContext.Default.LoadFromAssemblyPath(path); return asm.GetType(splitName[0].Trim()); } else
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
9- github.com/advisories/GHSA-9xhh-3m78-gvgjghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-28698ghsaADVISORY
- github.com/MarimerLLC/csla/commit/2c32a5748a0a4bb0159285dfad61d4050e890080ghsaWEB
- github.com/MarimerLLC/csla/commit/445bc609bc117f62cabf49e1462f7a43b0f8f9a2ghsaWEB
- github.com/MarimerLLC/csla/commit/8fbdd8c773bfeb9ba3e52d91b5a664848629b13aghsaWEB
- github.com/MarimerLLC/csla/commit/f3a5c3474974f60ce3c8ffbd5d91c23a1e397ea4ghsaWEB
- github.com/MarimerLLC/csla/pull/3552nvdWEB
- github.com/MarimerLLC/csla/releases/tag/v5.5.4ghsaWEB
- www.intruder.io/research/path-traversal-and-code-execution-in-csla-net-cve-2024-28698nvdWEB
News mentions
0No linked articles in our index yet.