<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>DumbAssets — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/dumbassets/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 18:19:06 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/dumbassets/feed.xml" rel="self" type="application/rss+xml"/><item><title>DumbAssets Path Traversal Vulnerability (CVE-2026-45230)</title><link>https://feed.craftedsignal.io/briefs/2026-05-dumbassets-path-traversal/</link><pubDate>Mon, 18 May 2026 18:19:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dumbassets-path-traversal/</guid><description>DumbAssets version 1.0.11 is vulnerable to a path traversal vulnerability in the POST /api/delete-file endpoint, allowing unauthenticated attackers to delete arbitrary files, including critical files like server.js or package.json, resulting in denial of service.</description><content:encoded><![CDATA[<p>DumbAssets through version 1.0.11 is susceptible to a path traversal vulnerability identified as CVE-2026-45230. This flaw resides in the <code>POST /api/delete-file</code> endpoint, specifically within the <code>filesToDelete</code> array parameters. Exploitation requires no authentication by default, allowing remote attackers to delete arbitrary files on the system. By injecting <code>../</code> sequences, attackers can bypass directory boundary restrictions and traverse outside the intended application directory. The lack of proper input validation enables the deletion of critical files, such as <code>server.js</code> or <code>package.json</code>, leading to a complete denial of service (DoS) condition for the affected application.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a <code>POST</code> request to the <code>/api/delete-file</code> endpoint.</li>
<li>The attacker crafts the <code>filesToDelete</code> array within the request body to include filenames containing path traversal sequences (e.g., <code>../</code>).</li>
<li>The application receives the <code>POST</code> request and processes the <code>filesToDelete</code> array without proper validation or sanitization of the provided filenames.</li>
<li>The application attempts to resolve the file path based on the attacker-supplied input, leading to directory traversal outside of the intended application directory.</li>
<li>The application proceeds to delete the files specified in the <code>filesToDelete</code> array based on the manipulated file paths.</li>
<li>The attacker targets critical application files such as <code>server.js</code> or <code>package.json</code> using the path traversal vulnerability.</li>
<li>The targeted critical files are successfully deleted by the application.</li>
<li>The application experiences a denial of service due to the absence of essential files required for its operation.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to delete arbitrary files on the system. This can lead to the deletion of critical application files like <code>server.js</code> or <code>package.json</code>, resulting in a complete denial of service. Given the high CVSS score of 9.1, this vulnerability represents a significant risk. The absence of authentication by default makes exploitation straightforward, increasing the likelihood of successful attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule to detect malicious <code>POST</code> requests containing path traversal sequences targeting the <code>/api/delete-file</code> endpoint.</li>
<li>Inspect web server logs for <code>POST</code> requests to <code>/api/delete-file</code> with filename parameters containing <code>../</code> sequences.</li>
<li>Apply input validation and sanitization to the <code>filesToDelete</code> parameter in the <code>/api/delete-file</code> endpoint to prevent path traversal attacks.</li>
<li>Enforce authentication on the <code>/api/delete-file</code> endpoint to restrict access to authorized users only.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">threat</category><category>path traversal</category><category>denial of service</category><category>cve-2026-45230</category></item></channel></rss>