Executive Risk Summary
"An Arbitrary File Write vulnerability has been identified in Microsoft's Semantic Kernel .NET SDK, specifically within the SessionsPythonPlugin, which could allow an attacker to write files to arbitrary locations on the system. The issue has been fixed in Microsoft.SemanticKernel.Core version 1.71.0, and users can create a Function Invocation Filter as a mitigation."
Operational Audit Arsenal
Target Type DLL
Target Asset Microsoft.SemanticKernel.Core
Standard Path %windir%\Microsoft.NET\assembly\GAC_MSIL\Microsoft.SemanticKernel.Core
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: Microsoft.SemanticKernel.Core (DLL)
$Targets = 'Microsoft.SemanticKernel.Core'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")
Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue |
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}} Patch Impact Forecast
Reboot Required Unlikely
Low to Moderate
Internal Work Notes
Apply Microsoft.SemanticKernel.Core version 1.71.0 to mitigate Arbitrary File Write vulnerability in Semantic Kernel .NET SDK
Technical Intelligence & Operational Utilities • Delivered Weekly
Intelligence Sources
Official Advisoryhttps://github.com/microsoft/semantic-kernel/blob/main/dotnet/samples/Demos/CodeInterpreterPlugin/Program.cs#L61-L64
Official Advisoryhttps://github.com/microsoft/semantic-kernel/pull/13478/changes#diff-88d3cacba2bfa84eef8f2aa171b34f9940338cbb784a3ffc49f5fe3af1b8943d
Official Advisoryhttps://github.com/microsoft/semantic-kernel/security/advisories/GHSA-2ww3-72rp-wpp4
Related Microsoft Threats
Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.