<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cli — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cli/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 15:36:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cli/feed.xml" rel="self" type="application/rss+xml"/><item><title>Uniget Command Injection Vulnerability via Malicious Metadata</title><link>https://feed.craftedsignal.io/briefs/2026-05-uniget-command-injection/</link><pubDate>Wed, 13 May 2026 15:36:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-uniget-command-injection/</guid><description>Uniget is vulnerable to command injection because the `check` field is loaded directly from untrusted JSON metadata without validation, allowing an attacker to execute arbitrary shell commands on the victim's system when performing common uniget operations.</description><content:encoded><![CDATA[<p>Uniget is vulnerable to a command injection vulnerability (CVE-2026-45152) stemming from the unsafe execution of the <code>check</code> field within metadata files. This occurs because the <code>check</code> field, used for version checks, is executed via <code>/bin/bash -c</code> without proper sanitization or validation. An attacker can inject arbitrary shell commands by crafting malicious metadata. Common uniget operations such as <code>describe</code>, <code>install</code>, <code>update</code>, or <code>inspect</code> will trigger the vulnerability. This vulnerability affects uniget versions prior to 0.27.1, and successful exploitation leads to arbitrary code execution with the privileges of the user running uniget.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious JSON metadata file containing a payload within the <code>check</code> field.</li>
<li>The attacker places the malicious metadata file in the uniget metadata cache directory (<code>~/.local/var/cache/uniget/</code>).</li>
<li>The user executes a uniget command such as <code>describe</code>, <code>install</code>, <code>update</code>, or <code>inspect</code> targeting a tool defined in the malicious metadata.</li>
<li>Uniget loads the metadata for the specified tool using <code>json.Unmarshal()</code>.</li>
<li>The <code>tool.Check</code> field is populated with the attacker-controlled command from the JSON metadata.</li>
<li>Uniget executes the command defined in the <code>tool.Check</code> field using <code>/bin/bash -c</code>.</li>
<li>The shell interprets any shell metacharacters present in the command, resulting in command injection.</li>
<li>The attacker&rsquo;s injected commands are executed with the privileges of the user running uniget, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This command injection vulnerability allows an attacker to execute arbitrary code on a vulnerable system. This can lead to the exfiltration of sensitive data, installation of malware, or modification of system configurations. Compromised systems could be leveraged for further attacks within a network. This issue primarily affects users who import or process attacker-controlled metadata, potentially including CI/CD environments using uniget automation. Successful exploitation grants the attacker the same privileges as the user running uniget, potentially leading to complete system compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to uniget version 0.27.1 or later to patch CVE-2026-45152.</li>
<li>Deploy the Sigma rules in this brief to your SIEM to detect exploitation attempts.</li>
<li>If upgrading is not immediately feasible, avoid using uniget with untrusted metadata sources.</li>
<li>Monitor process creation events for <code>/bin/bash -c</code> executing commands sourced from uniget metadata locations, as detected by the Sigma rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command-injection</category><category>vulnerability</category><category>linux</category></item></channel></rss>