Workflow TV - XAML and Activity Assembly Spoofing

13 minutes, 9 seconds


Right click “Save as…”

What happens to a Workflow if an attacker can lure the workflow host into running XAML which references an assembly replaced by the attacker?  This is what I call an Activity Assembly Spoofing attack.  On this episode I'll show you how it can happen, what you need to know about the security model and what you can do to prevent it.


Ron Jacobs
Twitter: @ronljacobs


Follow the discussion

  • Oops, something didn't work.

    Getting subscription
    Subscribe to this conversation

Comments closed

Comments have been closed since this content was published more than 30 days ago, but if you'd like to continue the conversation, please create a new thread in our Forums, or Contact Us and let us know.