<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Zrok — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/zrok/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 15:39:49 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/zrok/feed.xml" rel="self" type="application/rss+xml"/><item><title>zrok 'copy' Path Traversal Vulnerability (CVE-2026-45576)</title><link>https://feed.craftedsignal.io/briefs/2026-05-zrok-path-traversal/</link><pubDate>Tue, 19 May 2026 15:39:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zrok-path-traversal/</guid><description>A path traversal vulnerability exists in zrok copy (CVE-2026-45576) where an attacker-controlled WebDAV or zrok drive can write files outside the destination root by manipulating the DAV `href` response.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in the <code>zrok copy</code> command, affecting versions prior to 2.0.3 and versions 0.4.23 through 1.1.11. The vulnerability, tracked as CVE-2026-45576, allows a malicious actor controlling a WebDAV or zrok drive to write files outside the intended destination root on a victim&rsquo;s system. This is achieved by manipulating the DAV <code>href</code> response to include path traversal sequences like <code>/../</code> which, when processed by the <code>FilesystemTarget.WriteStream</code> function, allows writing arbitrary files within the sharing user&rsquo;s credentials. This poses a significant risk of sensitive information being overwritten.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Bob sets up a malicious WebDAV server or a zrok drive.</li>
<li>Bob crafts a DAV <code>href</code> response containing path traversal sequences, such as <code>/../outside.txt</code>.</li>
<li>Alice executes the <code>zrok2 copy</code> command, specifying Bob&rsquo;s malicious WebDAV server or zrok drive as the source and a local directory as the destination.</li>
<li>The <code>zrok2 copy</code> process retrieves the directory listing from Bob&rsquo;s server, including the crafted <code>href</code> value.</li>
<li>The <code>zrok2 copy</code> process stores the malicious path in the source inventory.</li>
<li>The <code>FilesystemTarget.WriteStream</code> function receives the malicious path from the source inventory.</li>
<li>The <code>FilesystemTarget.WriteStream</code> function joins the attacker-controlled path with the target root path.</li>
<li>The file <code>outside.txt</code> is created (or overwritten) outside Alice&rsquo;s specified target directory, with Alice&rsquo;s credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45576 allows a malicious user with access to a zrok share to traverse the directory tree arbitrarily on the system where the <code>zrok copy</code> command is executed. This can lead to the overwriting of sensitive information, potentially causing data loss, system instability, or privilege escalation if critical system files are targeted. The number of victims and the scope of impact depend on the privileges of the user running <code>zrok copy</code> and the contents of the files that are overwritten.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>zrok/v2</code> version 2.0.3 or later to patch CVE-2026-45576.</li>
<li>Upgrade <code>zrok</code> versions between 0.4.23 and 1.1.11 (inclusive) to a patched version.</li>
<li>Monitor file creation events for unexpected write operations outside the intended target directory using a file integrity monitoring system, and deploy the provided Sigma rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>webdav</category><category>zrok</category></item><item><title>zrok 'copy' Path Traversal Vulnerability (CVE-2026-45576)</title><link>https://feed.craftedsignal.io/briefs/2026-05-zrok-path-traversal/</link><pubDate>Tue, 19 May 2026 15:39:49 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-zrok-path-traversal/</guid><description>A path traversal vulnerability exists in zrok copy (CVE-2026-45576) where an attacker-controlled WebDAV or zrok drive can write files outside the destination root by manipulating the DAV `href` response.</description><content:encoded><![CDATA[<p>A path traversal vulnerability has been identified in the <code>zrok copy</code> command, affecting versions prior to 2.0.3 and versions 0.4.23 through 1.1.11. The vulnerability, tracked as CVE-2026-45576, allows a malicious actor controlling a WebDAV or zrok drive to write files outside the intended destination root on a victim&rsquo;s system. This is achieved by manipulating the DAV <code>href</code> response to include path traversal sequences like <code>/../</code> which, when processed by the <code>FilesystemTarget.WriteStream</code> function, allows writing arbitrary files within the sharing user&rsquo;s credentials. This poses a significant risk of sensitive information being overwritten.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Bob sets up a malicious WebDAV server or a zrok drive.</li>
<li>Bob crafts a DAV <code>href</code> response containing path traversal sequences, such as <code>/../outside.txt</code>.</li>
<li>Alice executes the <code>zrok2 copy</code> command, specifying Bob&rsquo;s malicious WebDAV server or zrok drive as the source and a local directory as the destination.</li>
<li>The <code>zrok2 copy</code> process retrieves the directory listing from Bob&rsquo;s server, including the crafted <code>href</code> value.</li>
<li>The <code>zrok2 copy</code> process stores the malicious path in the source inventory.</li>
<li>The <code>FilesystemTarget.WriteStream</code> function receives the malicious path from the source inventory.</li>
<li>The <code>FilesystemTarget.WriteStream</code> function joins the attacker-controlled path with the target root path.</li>
<li>The file <code>outside.txt</code> is created (or overwritten) outside Alice&rsquo;s specified target directory, with Alice&rsquo;s credentials.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45576 allows a malicious user with access to a zrok share to traverse the directory tree arbitrarily on the system where the <code>zrok copy</code> command is executed. This can lead to the overwriting of sensitive information, potentially causing data loss, system instability, or privilege escalation if critical system files are targeted. The number of victims and the scope of impact depend on the privileges of the user running <code>zrok copy</code> and the contents of the files that are overwritten.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade to <code>zrok/v2</code> version 2.0.3 or later to patch CVE-2026-45576.</li>
<li>Upgrade <code>zrok</code> versions between 0.4.23 and 1.1.11 (inclusive) to a patched version.</li>
<li>Monitor file creation events for unexpected write operations outside the intended target directory using a file integrity monitoring system, and deploy the provided Sigma rules.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>webdav</category><category>zrok</category></item></channel></rss>