<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Fast-Uri (&lt;= 3.1.0) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/fast-uri--3.1.0/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/fast-uri--3.1.0/feed.xml" rel="self" type="application/rss+xml"/><item><title>fast-uri Path Traversal Vulnerability via Percent-Encoded Dot Segments</title><link>https://feed.craftedsignal.io/briefs/2024-01-fast-uri-path-traversal/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-fast-uri-path-traversal/</guid><description>fast-uri versions 3.1.0 and earlier are vulnerable to path traversal due to decoding percent-encoded path separators and dot segments before dot-segment removal, potentially leading to bypasses of path-based policy enforcement.</description><content:encoded><![CDATA[<p>fast-uri, a JavaScript library used for URI parsing and normalization, is susceptible to a path traversal vulnerability (CVE-2026-6321) in versions 3.1.0 and earlier. The vulnerability arises from the library&rsquo;s decoding of percent-encoded path separators (<code>%2F</code>) and dot segments (<code>%2E</code>) before applying dot-segment removal during URI normalization. This can cause distinct URIs to collapse onto the same normalized path, potentially allowing attackers to bypass path-based access controls. Applications that rely on fast-uri for URL normalization or comparison may be vulnerable. Defenders should upgrade to fast-uri version 3.1.1 or later to remediate this issue.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious URL containing percent-encoded dot segments (e.g., <code>%2E%2E</code>) or path separators (e.g., <code>%2F</code>).</li>
<li>The attacker supplies the crafted URL to a vulnerable application that uses <code>fast-uri</code> for URL processing, comparison, or normalization.</li>
<li>The <code>fast-uri</code> library decodes the percent-encoded characters before performing dot-segment removal.</li>
<li>The decoded path segments are processed, potentially leading to path traversal (e.g., <code>public/%2e%2e/admin</code> becomes <code>public/../admin</code>).</li>
<li>The <code>normalize()</code> or <code>equal()</code> functions in <code>fast-uri</code> further process the URI, resulting in an unexpected final path (e.g., <code>public/../admin</code> becomes <code>/admin</code>).</li>
<li>The application uses the normalized URL to make access control decisions, believing the user is accessing a different resource than intended.</li>
<li>The attacker gains unauthorized access to restricted resources or functionality.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows attackers to bypass path-based access controls in applications utilizing the vulnerable versions of <code>fast-uri</code>. This can result in unauthorized access to sensitive data, modification of configurations, or execution of arbitrary code, depending on the application&rsquo;s functionality and the resources exposed. The severity of the impact is highly dependent on the specific application and its security architecture.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>fast-uri</code> version 3.1.1 or later to patch CVE-2026-6321, as indicated in the advisory.</li>
<li>Deploy the Sigma rule &ldquo;Detect fast-uri Path Traversal Attempts via URL Normalization&rdquo; to identify potential exploitation attempts in web server logs.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>defense-evasion</category><category>javascript</category></item></channel></rss>