<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Nautobot ( &lt; 2.4.33) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/nautobot---2.4.33/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 15:31:55 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/nautobot---2.4.33/feed.xml" rel="self" type="application/rss+xml"/><item><title>Nautobot GitRepository current_head Field Writable via REST API (CVE-2026-44798)</title><link>https://feed.craftedsignal.io/briefs/2026-05-nautobot-gitrepository-writable/</link><pubDate>Wed, 13 May 2026 15:31:55 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-nautobot-gitrepository-writable/</guid><description>A user with permissions to modify GitRepository records can manipulate the `current_head` field via the REST API in Nautobot, leading to repository state desynchronization or unavailability; this is remediated in versions 2.4.33 and 3.1.2.</description><content:encoded><![CDATA[<p>A vulnerability exists in Nautobot versions prior to 2.4.33 and between 3.0.0a2 and 3.1.2 that allows users with the ability to add or change GitRepository records to manipulate the <code>current_head</code> field through the REST API. This field, intended for internal use, dictates the commit hash that Nautobot&rsquo;s local clone of the repository checks out. By directly modifying this field, an attacker can force the local repository to an arbitrary state, potentially checking out an older commit, a non-existent commit, or a malformed value. This can lead to incorrect or misleading infrastructure state within Nautobot and may require manual intervention to resolve. The vulnerability, identified as CVE-2026-44798, was addressed in Nautobot versions 2.4.33 and 3.1.2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the Nautobot REST API with credentials that have permissions to modify GitRepository records.</li>
<li>The attacker identifies a GitRepository record they wish to manipulate.</li>
<li>The attacker crafts a REST API PUT or PATCH request to the GitRepository endpoint.</li>
<li>The request includes a modified <code>current_head</code> field containing a commit hash value. This value may be an older commit hash, a nonexistent commit hash, or a malformed string.</li>
<li>Nautobot processes the API request and updates the <code>current_head</code> field of the specified GitRepository record with the attacker-supplied value.</li>
<li>Nautobot&rsquo;s background processes attempt to synchronize the local Git repository clone with the updated <code>current_head</code>.</li>
<li>Depending on the value of <code>current_head</code>, the synchronization either checks out the specified commit, fails due to an invalid commit, or corrupts the local repository.</li>
<li>The attacker achieves the objective of desynchronizing Nautobot&rsquo;s view of the repository state or rendering the repository unusable.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-44798 can cause Nautobot&rsquo;s view of network infrastructure to become inconsistent with the actual state represented in the Git repository. This can lead to misconfiguration, failed automation tasks, and general operational disruption. In the worst-case scenario, manual intervention is required to correct the <code>current_head</code> value and resynchronize the repository. The number of affected installations is unknown, but any Nautobot instance with users who can modify GitRepository objects is potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Nautobot to version 2.4.33 or 3.1.2 to address CVE-2026-44798.</li>
<li>Review and restrict user permissions to create and modify GitRepository records, as suggested in the advisory workaround.</li>
<li>Implement the detection rule &ldquo;Detect Direct Modification of Nautobot GitRepository current_head via API&rdquo; to monitor for unauthorized changes to the <code>current_head</code> field via the REST API.</li>
<li>Monitor webserver logs for PATCH or PUT requests to the <code>/api/extras/git-repositories/&lt;id&gt;/</code> endpoint that contain the <code>current_head</code> parameter, using a rule similar to &ldquo;Detect API Requests to Modify Nautobot GitRepository current_head&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>nautobot</category><category>gitrepository</category><category>rest-api</category><category>privilege-escalation</category></item></channel></rss>