<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Acl — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/acl/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 10 Apr 2026 20:02:46 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/acl/feed.xml" rel="self" type="application/rss+xml"/><item><title>Goshs File-Based ACL Authorization Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-goshs-acl-bypass/</link><pubDate>Fri, 10 Apr 2026 20:02:46 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-goshs-acl-bypass/</guid><description>Goshs is vulnerable to an authorization bypass (CVE-2026-40189) due to inconsistent enforcement of .goshs ACLs on state-changing routes, allowing an unauthenticated attacker to manipulate files within protected directories and bypass authentication barriers.</description><content:encoded><![CDATA[<p>The Goshs web server is susceptible to a critical authorization bypass (CVE-2026-40189) affecting versions up to and including 1.1.4 and v2.0.0-beta.3. The vulnerability stems from inconsistent enforcement of file-based ACLs defined by <code>.goshs</code> files. While the application correctly enforces authorization for reading and listing files, state-changing routes such as PUT, POST /upload, ?mkdir, and ?delete do not perform the same authorization checks. This allows unauthenticated attackers to upload, create, and delete files within directories that should be protected by authentication. The most severe impact arises from the ability to delete the <code>.goshs</code> file itself, thereby removing the authentication requirement and exposing previously protected content. This vulnerability undermines the intended security mechanisms of Goshs, posing a significant risk to data confidentiality, integrity, and availability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a Goshs instance utilizing <code>.goshs</code> files for access control.</li>
<li>The attacker sends an unauthenticated PUT request to upload a file to a protected directory, bypassing ACL checks via <code>httpserver/updown.go:18-60</code>. Example: <code>PUT /protected/put-created.txt</code></li>
<li>Alternatively, the attacker sends an unauthenticated multipart POST request to <code>/upload</code> endpoint to upload a file to a protected directory, bypassing ACL checks via <code>httpserver/updown.go:63-165</code>. Example: <code>POST /protected/upload</code></li>
<li>The attacker sends an unauthenticated request with the <code>?mkdir</code> parameter to create a directory within the protected directory, bypassing ACL checks via <code>httpserver/handler.go:901-937</code>. Example: <code>/?mkdir=new_directory</code></li>
<li>The attacker sends an unauthenticated request with the <code>?delete</code> parameter targeting the <code>.goshs</code> file within the protected directory, leveraging the vulnerable route in <code>httpserver/handler.go:679-698</code>. Example: <code>/.goshs?delete</code></li>
<li>The server deletes the <code>.goshs</code> file using <code>os.RemoveAll()</code>, effectively removing the access control restrictions for the directory.</li>
<li>The attacker sends an unauthenticated request to access previously protected files, which are now accessible due to the absence of the <code>.goshs</code> file.</li>
<li>The attacker gains unauthorized access to sensitive information and can perform further malicious actions, such as deleting or modifying critical files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to bypass intended access controls in Goshs deployments. This can lead to unauthorized access to sensitive files, potentially exposing confidential information. Attackers can also create, modify, or delete files within protected directories, causing data corruption or service disruption. The ability to delete the <code>.goshs</code> file directly amplifies the impact, as it permanently removes the authentication barrier, affecting all previously protected content. This vulnerability poses a significant threat to the confidentiality, integrity, and availability of Goshs-hosted data.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the vendor-supplied patch or upgrade to a version of Goshs that addresses CVE-2026-40189.</li>
<li>Deploy the Sigma rule &ldquo;Detect Goshs Unauthenticated .goshs Deletion&rdquo; to your SIEM to detect attempts to remove <code>.goshs</code> ACL files via the <code>?delete</code> parameter.</li>
<li>Deploy the Sigma rule &ldquo;Detect Goshs Unauthenticated PUT Request to Protected Directories&rdquo; to detect unauthorized file uploads to protected directories.</li>
<li>Monitor web server logs for PUT, POST, and DELETE requests targeting directories containing <code>.goshs</code> files to identify potential exploitation attempts. (Log Source: webserver)</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>authorization bypass</category><category>acl</category><category>file upload</category><category>file deletion</category><category>CVE-2026-40189</category></item></channel></rss>