<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Scramble (0.13.2 - 0.13.21) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/scramble-0.13.2---0.13.21/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/scramble-0.13.2---0.13.21/feed.xml" rel="self" type="application/rss+xml"/><item><title>Scramble Remote Code Execution via User-Controlled Input</title><link>https://feed.craftedsignal.io/briefs/2024-01-scramble-rce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-scramble-rce/</guid><description>Scramble versions 0.13.2 through 0.13.21 are vulnerable to remote code execution due to the evaluation of user-controlled input in validation rules during documentation generation, potentially allowing attackers to execute arbitrary PHP code.</description><content:encoded><![CDATA[<p>A remote code execution vulnerability, identified as CVE-2026-44262, affects Scramble versions 0.13.2 up to 0.13.21. This flaw stems from the evaluation of user-controlled input within validation rules when documentation endpoints are publicly accessible. Specifically, during the generation of API documentation, request supplied data that is referenced in the validation rules can be evaluated, resulting in the execution of arbitrary PHP code within the application&rsquo;s context. This vulnerability allows unauthenticated attackers to potentially gain full control of the affected system. The issue has been addressed in Scramble version 0.13.22. Defenders should prioritize patching to mitigate the risk of exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Scramble application running a vulnerable version (0.13.2 - 0.13.21) with publicly accessible documentation endpoints, such as <code>/docs/api</code> or <code>/docs/api.json</code>.</li>
<li>The attacker analyzes the application&rsquo;s validation rules to identify endpoints that utilize user-controlled input (e.g., request parameters) within validation expressions.</li>
<li>The attacker crafts a malicious HTTP request containing a payload designed to inject PHP code into the validation rule&rsquo;s expression.</li>
<li>The crafted request is sent to an endpoint that triggers the vulnerable validation rule.</li>
<li>During the documentation generation process, Scramble evaluates the malicious input, leading to the execution of the injected PHP code.</li>
<li>The attacker&rsquo;s PHP code executes within the application&rsquo;s context, potentially allowing them to read sensitive files, execute system commands, or establish a reverse shell.</li>
<li>The attacker leverages the gained access to move laterally within the network, escalate privileges, or exfiltrate sensitive data.</li>
<li>The attacker achieves their final objective, such as data theft, system compromise, or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary PHP code on the affected server. This can lead to complete system compromise, including data theft, modification, or destruction. Given the nature of RCE vulnerabilities, the impact is considered critical. The number of affected systems depends on the prevalence of Scramble within publicly accessible environments, but any unpatched instance is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Scramble to version 0.13.22 or later to patch CVE-2026-44262.</li>
<li>Restrict access to documentation endpoints (<code>/docs/api</code>, <code>/docs/api.json</code>) to trusted networks or users as a workaround if patching is not immediately feasible.</li>
<li>Review and eliminate the use of user-controlled variables inside validation rule expressions, as suggested in the advisory.</li>
<li>Implement a web application firewall (WAF) rule to detect and block requests containing potentially malicious PHP code in request parameters.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>vulnerability</category><category>php</category></item></channel></rss>