<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>NetBox (4.3.5 - 4.5.4) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/netbox-4.3.5---4.5.4/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 17:16:22 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/netbox-4.3.5---4.5.4/feed.xml" rel="self" type="application/rss+xml"/><item><title>NetBox RCE via Jinja2 Template Injection (CVE-2026-29514)</title><link>https://feed.craftedsignal.io/briefs/2026-05-netbox-rce/</link><pubDate>Mon, 04 May 2026 17:16:22 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-netbox-rce/</guid><description>NetBox versions 4.3.5 through 4.5.4 are vulnerable to remote code execution (RCE) via template injection, where authenticated users with specific permissions can inject malicious Python callables into template parameters, bypassing Jinja2 sandboxing to execute arbitrary code.</description><content:encoded><![CDATA[<p>NetBox, a widely-used infrastructure resource modeling application, is vulnerable to remote code execution (RCE) in versions 4.3.5 through 4.5.4. This vulnerability, identified as CVE-2026-29514, resides in the <code>RenderTemplateMixin.get_environment_params()</code> method. An authenticated attacker with <code>exporttemplate</code> or <code>configtemplate</code> permissions can exploit this flaw by injecting malicious Python callables into the <code>environment_params</code> field. Successful exploitation allows the attacker to bypass the Jinja2 SandboxedEnvironment, achieving arbitrary code execution as the NetBox service user. This RCE can lead to complete system compromise, data exfiltration, or denial of service. Defenders should prioritize patching and implement the detection measures outlined below.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the NetBox web application with <code>exporttemplate</code> or <code>configtemplate</code> permissions.</li>
<li>The attacker crafts a malicious request to modify or create an export/config template.</li>
<li>Within the request, the attacker injects a Python callable, such as <code>subprocess.getoutput</code>, into the <code>environment_params</code> field. The <code>finalize</code> parameter of the Jinja2 environment is set to this callable.</li>
<li>NetBox processes the request, and the Jinja2 environment is initialized with the attacker-controlled <code>finalize</code> parameter.</li>
<li>When the template is rendered, every expression outside the sandbox&rsquo;s call interception mechanism is processed.</li>
<li>The injected callable (<code>subprocess.getoutput</code>) is invoked on the rendered expression.</li>
<li>The <code>subprocess.getoutput</code> callable executes arbitrary shell commands as the NetBox service user.</li>
<li>The attacker gains remote code execution, potentially leading to full system compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29514 allows an authenticated attacker to execute arbitrary code on the NetBox server. The impact includes potential full system compromise, data exfiltration, and denial of service. Given that NetBox is often used to manage critical infrastructure information, a successful attack could have significant consequences, potentially affecting numerous organizations that rely on accurate network data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade NetBox to a patched version (4.5.5 or later) to remediate CVE-2026-29514.</li>
<li>Implement the provided Sigma rule to detect attempts to inject malicious callables into <code>environment_params</code> via webserver logs.</li>
<li>Review and restrict <code>exporttemplate</code> and <code>configtemplate</code> permissions to only those users who require them.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>template-injection</category><category>netbox</category><category>cve-2026-29514</category></item></channel></rss>