<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cloakbrowser (&lt;= 0.3.27) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/cloakbrowser--0.3.27/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 17:50:51 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/cloakbrowser--0.3.27/feed.xml" rel="self" type="application/rss+xml"/><item><title>CloakBrowser cloakserve Unauthenticated Path Traversal Leading to Arbitrary Directory Deletion (CVE-2026-45727)</title><link>https://feed.craftedsignal.io/briefs/2026-05-cloakbrowser-path-traversal/</link><pubDate>Mon, 18 May 2026 17:50:51 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cloakbrowser-path-traversal/</guid><description>An unauthenticated path traversal vulnerability exists in CloakBrowser's cloakserve component (versions 0.3.27 and earlier) where a crafted fingerprint query parameter with path traversal sequences can be used to delete arbitrary directories accessible to the service user (CVE-2026-45727).</description><content:encoded><![CDATA[<p>CloakBrowser&rsquo;s <code>cloakserve</code> component is vulnerable to an unauthenticated path traversal attack. The vulnerability stems from the direct use of the user-supplied <code>fingerprint</code> query parameter as a filesystem path component when creating Chrome profile directories. An attacker, without needing authentication, can send a crafted <code>fingerprint</code> value containing path traversal sequences to manipulate the <code>user_data_dir</code> resolution to point outside the intended <code>data_dir</code>. This vulnerability affects CloakBrowser versions 0.3.27 and earlier. The default configuration of <code>cloakserve</code> binding to <code>0.0.0.0</code> exacerbates the issue by making it network-exposed. By exploiting this vulnerability, attackers can delete arbitrary directories accessible to the service user when Chrome fails to start or during process cleanup.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker sends an HTTP request to the exposed <code>cloakserve</code> port.</li>
<li>The request includes a crafted <code>fingerprint</code> query parameter containing path traversal sequences (e.g., <code>../</code>).</li>
<li><code>cloakserve</code> uses the <code>fingerprint</code> parameter to construct a path for the Chrome profile directory (<code>user_data_dir</code>).</li>
<li>The path traversal sequences in the <code>fingerprint</code> parameter cause <code>user_data_dir</code> to resolve outside the configured <code>data_dir</code>.</li>
<li>Chrome attempts to start using the manipulated <code>user_data_dir</code>.</li>
<li>Chrome fails to start, potentially due to issues with the traversed path or profile directory.</li>
<li>During cleanup or when the process is terminated, <code>shutil.rmtree()</code> is called to delete the <code>user_data_dir</code>.</li>
<li>Due to the path traversal, <code>shutil.rmtree()</code> deletes an arbitrary directory accessible to the service user.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an unauthenticated attacker with network access to the <code>cloakserve</code> port to delete arbitrary directories accessible to the service user. The number of affected installations is unknown. This vulnerability allows for denial of service or potentially more severe impacts depending on the contents and permissions of the deleted directories.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade CloakBrowser to version 0.3.28 or later to remediate the vulnerability as advised in the overview.</li>
<li>Restrict network access to the <code>cloakserve</code> port (typically port 8080) as described in the mitigations section of the linked advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect CloakBrowser Path Traversal Attempt via Crafted Fingerprint&rdquo; to monitor for suspicious <code>fingerprint</code> parameters containing path traversal sequences.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>directory-deletion</category><category>cloakbrowser</category><category>CVE-2026-45727</category></item></channel></rss>