Skip to content

Assembly.Load Exploit C# #2353

Open
Open
@PlantBronze

Description

@PlantBronze

What happened?

Assembly.Load and MemoryStream function can be manipulated in client sided c# to load bytes onto the clients pc

Expected result

nothing

Reproduction steps

This is a small example of some c# that returns the bytes from plain UTF8

        string data = "Test UTF8 Data, this will be converted into bytes and printed, which can be manipulated into retrieving it from another source than this current specified one";
        byte[] dataBytes = Encoding.UTF8.GetBytes(data);
        memoryStream.Write(dataBytes, 0, dataBytes.Length);

        byte[] resultBytes = GetMemoryStreamBytes(memoryStream);

        Debug.WriteLine("Original Data: " + data);
        Debug.WriteLine("Bytes from MemoryStream: " + BitConverter.ToString(resultBytes));

Importancy

Security issue

Area(s)

FiveM, ScRT: C#

Specific version(s)

FiveM

Additional information

No response

Metadata

Metadata

Assignees

Labels

ScRT: C#Issues/PRs related to either C# scripting runtimesbugtriageNeeds a preliminary assessment to determine the urgency and required action

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions