Update PowerShell 7.0 & 7.1 To Protect Your Azure Resources From Hackers Against .NET Core RCE Bug

https://gbhackers.com/update-powershell-7-0-7-1/

System.Text.Encodings.Web.
5.0.0.
5.0.1.

According to a Microsoft report “The susceptible package is System.Text.Encodings.Web. Upgrading your plan and redeploying your app should suffice to resolve this vulnerability.”

Any following.NET 5,. WEB Core, or.NET Framework-based application that utilizes the System.Text.Encodings.Web bundle with a vulnerable variation.

Microsoft released a security upgrade for Azure users against an important Remote code execution bug that affects.NET Core at PowerShell Variation 7.0 & & 7.1, and the bug enables hackers to get to your Azure resources remotely.

System.Text.Encodings.Web
4.0.0– 4.5.0
4.5.1

System.Text.Encodings.Web
4.6.0-4.7.1.
4.7.2.

PowerShell is a scripting language that is built on the.NET Common Language Runtime (CLR) and is developed with the functions to run cross-platform consists of on Windows, Linux, and macOS.

Considering that there is no workaround mitigation, Microsoft highly advised upgrading from PowerShell Version 7.0 to 7.0.6 & & Version 7.1 to 7.1.3. You can download the new variation of PowerShell here.

Plan Name
Susceptible Versions
Secure Versions

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

The Vulnerability can be tracked as CVE-2021-24112 that is affected by the.NET 5.0,. NET Core 3.1, and.NET Core 2.1 likewise keep in mind that Windows PowerShell 5.1 isnt impacted by this concern.