Path Traversal Vulnerability in engineer-your-data
A path traversal vulnerability (CVE-2026-7214) exists in eghuzefa's engineer-your-data up to version 0.1.3, allowing remote attackers to read or write arbitrary files by manipulating the WORKSPACE_PATH argument.
A path traversal vulnerability, identified as CVE-2026-7214, has been discovered in eghuzefa’s engineer-your-data, specifically affecting versions up to 0.1.3. This flaw resides within the read_file, write_file, list_files, and file_inf functions of the src/server.py file. Successful exploitation allows a remote attacker to bypass directory restrictions and access or modify files outside the intended WORKSPACE_PATH. The vulnerability’s ease of exploitation is increased by the public availability of exploit code. Although the project was notified through an issue report, no response or patch has been released to date. This poses a significant risk to systems running vulnerable versions of engineer-your-data, potentially leading to sensitive data exposure or unauthorized modifications.
Attack Chain
- The attacker identifies a vulnerable instance of
engineer-your-datarunning version 0.1.3 or earlier. - The attacker crafts a malicious request targeting the
read_file,write_file,list_files, orfile_infendpoints. - The malicious request includes a manipulated
WORKSPACE_PATHargument containing path traversal sequences (e.g.,../). - The
src/server.pyscript processes the request without proper sanitization or validation of theWORKSPACE_PATH. - The application attempts to access a file system resource based on the attacker-controlled path.
- Due to the path traversal, the application accesses a file or directory outside the intended
WORKSPACE_PATH. - If the
read_filefunction is targeted, the attacker retrieves the contents of an arbitrary file. - If the
write_filefunction is targeted, the attacker can overwrite an arbitrary file.
Impact
Successful exploitation of this vulnerability allows a remote, unauthenticated attacker to read sensitive files on the server, potentially exposing credentials, configuration files, or other confidential data. Alternatively, an attacker could overwrite system files, leading to denial of service or arbitrary code execution. Given the public availability of exploit code, vulnerable systems are at high risk of compromise. The impact is amplified by the lack of a patch or response from the project maintainers.
Recommendation
- Monitor web server logs for suspicious requests containing path traversal sequences (e.g., “../”) in the
WORKSPACE_PATHparameter, as described in the attack chain. Deploy the Sigma ruleDetect Engineer-Your-Data Path Traversal Attemptto identify malicious requests. - Apply input validation and sanitization to the
WORKSPACE_PATHargument insrc/server.pyto prevent path traversal, addressing CVE-2026-7214. - Consider using a web application firewall (WAF) to block requests containing path traversal sequences.
Detection coverage 2
Detect Engineer-Your-Data Path Traversal Attempt
highDetects attempts to exploit the path traversal vulnerability (CVE-2026-7214) in engineer-your-data by identifying requests with path traversal sequences in the WORKSPACE_PATH parameter.
Detect Engineer-Your-Data File Access via Traversal
mediumDetects file access attempts resulting from path traversal in engineer-your-data by monitoring for file access events with unusual paths.
Detection queries are kept inside the platform. Get full rules →