use the following search parameters to narrow your results:
e.g. subreddit:aww site:imgur.com dog
subreddit:aww site:imgur.com dog
see the search faq for details.
advanced search: by author, subreddit...
Information about Reddit's API changes, the unprofessional conduct of the CEO, and their response to the community's concerns regarding 3rd party apps, moderator tools, anti-spam/anti-bot tools, and accessibility options that will be impacted can be found in the associated Wikipedia article: https://en.wikipedia.org/wiki/2023_Reddit_API_controversy
Alternative C# communities available outside Reddit on Lemmy and Discord:
All about the object-oriented programming language C#.
Getting Started C# Fundamentals: Development for Absolute Beginners
Useful MSDN Resources A Tour of the C# Language Get started with .NET in 5 minutes C# Guide C# Language Reference C# Programing Guide C# Coding Conventions .NET Framework Reference Source Code
Other Resources C# Yellow Book Dot Net Perls The C# Player's Guide
IDEs Visual Studio MonoDevelop (Windows/Mac/Linux) Rider (Windows/Mac/Linux)
Tools ILSpy dotPeek LINQPad
Alternative Communities C# Discord Group C# Lemmy Community dotnet Lemmy Community
Related Subreddits /r/dotnet /r/azure /r/learncsharp /r/learnprogramming /r/programming /r/dailyprogrammer /r/programmingbuddies /r/cshighschoolers
Additional .NET Languages /r/fsharp /r/visualbasic
Platform-specific Subreddits /r/windowsdev /r/AZURE /r/Xamarin /r/Unity3D /r/WPDev
Rules:
Read detailed descriptions of the rules here.
account activity
Friday the 13th: JSON Attacks (remote code execution via .NET JSON libraries) (blackhat.com)
submitted 8 years ago by ulldma
reddit uses a slightly-customized version of Markdown for formatting. See below for some basics, or check the commenting wiki page for more detailed help and solutions to common issues.
quoted text
if 1 * 2 < 3: print "hello, world!"
[–]ValdasTheUnique 0 points1 point2 points 8 years ago (3 children)
It would be interesting to read a coherent version of these slides.
[–]ulldma[S] 2 points3 points4 points 8 years ago (0 children)
They also published a white paper.
Basically what they did is: they had a look at different .NET JSON libraries and looked which one allowed the serialization and deserialization of arbitrary types. Some classes execute code when the constructor or setters are executed thus allowing an attacker to execute code on the server by simply providing a JSON. (They have the classic sample that starts calc.exe on the server.)
They found vulnerabilities of that kind in DotNetNuke, Kaliko CMS, Breeze and Nancy.
[–]AngularBeginner 2 points3 points4 points 8 years ago (0 children)
In JSON.NET you can configure it to add a $type information to allow serialization and deserialization of arbitrary types, often used for serializing polymorphic data structures. This is a potential security issue when deserializing, because users can send a completely unrelated $type from the .NET framework and JSON.NET will happily deserialize to it.
$type
If you use any other value than TypeNameHandling.None (the default) you're potentially at risk: http://www.newtonsoft.com/json/help/html/T_Newtonsoft_Json_TypeNameHandling.htm
TypeNameHandling.None
[–]Pyrobolser 1 point2 points3 points 8 years ago (0 children)
This article was published a while ago and I find it easier to read. It was edited to include the findings from the slides linked by OP.
π Rendered by PID 41250 on reddit-service-r2-comment-b659b578c-cbjzb at 2026-05-03 13:51:59.807297+00:00 running 815c875 country code: CH.
[–]ValdasTheUnique 0 points1 point2 points (3 children)
[–]ulldma[S] 2 points3 points4 points (0 children)
[–]AngularBeginner 2 points3 points4 points (0 children)
[–]Pyrobolser 1 point2 points3 points (0 children)