SOAPwn Pwning .NET Framework Applications Through HTTP Clien... #1664
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This blog summarizes the Black Hat Europe 2025 research “SOAPwn: Pwning .NET Framework Applications Through HTTP Client Proxies and WSDL”, showing how a long‑standing design flaw in .NET Framework HTTP client proxies becomes a powerful primitive for NTLM credential abuse, arbitrary file writes, and practical RCE in multiple real‑world products (Barracuda Service Center RMM – CVE‑2025‑34392, Ivanti Endpoint Manager – CVE‑2025‑13659, Umbraco 8 CMS, Microsoft PowerShell, Microsoft SSIS).
🔧 Technical Details
Trick 1 – Abusing HttpWebClientProtocol’s Scheme‑Agnostic WebRequest
.NET’s
HttpWebClientProtocol.GetWebRequestcallsWebRequest.Create(uri)and then performswebRequest as HttpWebRequest, but returns the originalwebRequestregardless of whether the cast succeeds. BecauseWebRequest.Createdispatches by URI scheme, anyHttpWebClientProtocol‑derived proxy (SoapHttpClientProtocol,DiscoveryClientProtocol, etc.) will useFileWebRequest,FtpWebRequest, or SMB/UNC handlers whenever itsUrlisfile://,ftp://, orfile://<UNC>. For SOAP proxies, this means POST bodies (SOAP envelopes) are written directly to files instead of being sent via HTTP, or to SMB shares, enabling file write and NTLM credential exposure primitives.Trick 2 – NTLM Relaying / Challenge Capture via UNC URL...
🤖 Agent Actions
Summary:
{{#ref}}block so the technique is discoverable alongside other tech-specific guidance.Tests: Not run (docs-only changes).
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.