Workflow TV - XAML and Activity Assembly Spoofing

Sign in to queue

Description

What happens to a Workflow if an attacker can lure the workflow host into running XAML which references an assembly replaced by the attacker?  This is what I call an Activity Assembly Spoofing attack.  On this episode I'll show you how it can happen, what you need to know about the security model and what you can do to prevent it.

Links

Ron Jacobs
http://blogs.msdn.com/rjacobs
Twitter: @ronljacobs http://twitter.com/ronljacobs

Tags:

Security, WF, WF4

Embed

Download

Download this episode

The Discussion

Add Your 2 Cents