<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Arbitrary-File-Overwrite — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/arbitrary-file-overwrite/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 18 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/arbitrary-file-overwrite/feed.xml" rel="self" type="application/rss+xml"/><item><title>compressing npm Package Symlink Bypass Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-compressing-symlink-bypass/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-compressing-symlink-bypass/</guid><description>A vulnerability in the `compressing` npm package (&lt;=v2.1.0) allows for arbitrary file overwrite via symlink path traversal, bypassing a previous patch for CVE-2026-24884.</description><content:encoded><![CDATA[<p>The <code>compressing</code> npm package (v2.1.0 and earlier) contains a critical vulnerability that permits arbitrary file overwrites due to a symlink path traversal bypass. This bypass affects the patch for CVE-2026-24884. The vulnerability arises from an incomplete validation in the <code>isPathWithinParent</code> utility, where path string checks are performed without verifying the filesystem state, specifically symbolic links. By cloning a malicious repository containing a pre-existing symbolic link, a victim unknowingly plants a &ldquo;poisoned path&rdquo; on their system. The attacker can then craft a malicious archive that, when extracted by the vulnerable library, follows the symlink and overwrites arbitrary files. The ease of exploitation via <code>git clone</code> makes this vulnerability particularly dangerous.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker creates a malicious Git repository containing a symbolic link (e.g., <code>config_file</code>) pointing to a sensitive target file or directory (e.g., <code>/tmp/fake_root/etc/passwd</code>).</li>
<li>Attacker generates a malicious payload (e.g., <code>payload.tar</code>) containing a file with the same name as the symbolic link (e.g., <code>config_file</code>) and uploads both to their Git repository.</li>
<li>Victim clones the attacker&rsquo;s Git repository using <code>git clone</code>. This action automatically restores the symbolic link on the victim&rsquo;s system.</li>
<li>Victim runs an application that utilizes the vulnerable <code>compressing</code> library to extract the <code>payload.tar</code> archive.</li>
<li>The <code>compressing</code> library&rsquo;s <code>isPathWithinParent</code> function resolves the path to the file being extracted. Due to lack of <code>lstat</code> checks, the symbolic link is not detected.</li>
<li>The <code>fs.writeFile</code> function follows the symlink, writing the contents of the file from <code>payload.tar</code> to the targeted sensitive file (e.g., <code>/tmp/fake_root/etc/passwd</code>).</li>
<li>Arbitrary file overwrite occurs, potentially leading to privilege escalation or code execution.</li>
<li>Attacker achieves persistent access or control by overwriting critical system files.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows attackers to overwrite arbitrary files on the victim&rsquo;s system, potentially leading to privilege escalation by modifying sensitive system files such as <code>/etc/passwd</code>. Remote Code Execution (RCE) can be achieved by overwriting executable binaries or startup scripts. Data corruption can also occur through the modification of application data or database files. This vulnerability impacts developers and organizations using the <code>compressing</code> library up to version v2.1.0 when extracting untrusted archives.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the <code>compressing</code> npm package to a patched version that includes proper symlink handling. This is the primary remediation.</li>
<li>Inspect Git repositories for suspicious symbolic links before cloning. Use <code>git ls-tree -r &lt;commit-ish&gt; | grep 120000</code> to search for symlinks in a repository.</li>
<li>Implement runtime monitoring for file writes to unexpected locations based on the <code>compressing</code> library&rsquo;s activity. Create a detection rule based on <code>process_creation</code> and <code>file_event</code> to detect writes to sensitive directories such as <code>/etc</code> by processes spawned by Node.js that also load the vulnerable <code>compressing</code> module.</li>
<li>Monitor network connections originating from processes related to the <code>compressing</code> library after file extraction. Create a Sigma rule based on <code>network_connection</code> and <code>process_creation</code> to detect unusual outbound connections after archive extraction.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>npm</category><category>supply-chain</category><category>symlink</category><category>directory-traversal</category><category>privilege-escalation</category><category>arbitrary-file-overwrite</category></item><item><title>UXGROUP Cast to TV Screen Mirroring Arbitrary File Overwrite Vulnerability (CVE-2026-30282)</title><link>https://feed.craftedsignal.io/briefs/2026-03-cast-to-tv-overwrite/</link><pubDate>Tue, 31 Mar 2026 18:16:47 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cast-to-tv-overwrite/</guid><description>UXGROUP LLC Cast to TV Screen Mirroring v2.2.77 is vulnerable to arbitrary file overwrite (CVE-2026-30282) via the file import process, allowing attackers to overwrite critical internal files and potentially achieve arbitrary code execution or information exposure.</description><content:encoded><![CDATA[<p>CVE-2026-30282 describes an arbitrary file overwrite vulnerability affecting UXGROUP LLC&rsquo;s Cast to TV Screen Mirroring version 2.2.77. This vulnerability exists within the application&rsquo;s file import functionality. An attacker with the ability to supply a malicious file through the import process can overwrite critical internal application files. Successful exploitation can lead to arbitrary code execution within the context of the application or the exposure of sensitive information stored within the overwritten files. This vulnerability was published on March 31, 2026, and presents a significant risk to users of the affected software, as it could allow for complete compromise of the application and potentially the underlying system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an instance of UXGROUP LLC Cast to TV Screen Mirroring v2.2.77.</li>
<li>The attacker gains access to the file import functionality, which could be exposed through a user interface element or API endpoint.</li>
<li>The attacker crafts a malicious file designed to overwrite a critical internal application file. This could involve manipulating file paths or filenames to achieve the desired overwrite location.</li>
<li>The attacker imports the malicious file into the Cast to TV Screen Mirroring application using the intended file import mechanism.</li>
<li>The application processes the imported file, and due to the vulnerability, overwrites the targeted critical internal file.</li>
<li>If the overwritten file contains executable code, the attacker may be able to achieve arbitrary code execution within the context of the application.</li>
<li>Alternatively, if the overwritten file contains sensitive configuration data or credentials, the attacker may be able to steal this information.</li>
<li>The attacker leverages the code execution or stolen information to further compromise the system or network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-30282 allows an attacker to overwrite critical internal files within UXGROUP LLC Cast to TV Screen Mirroring v2.2.77. This can lead to arbitrary code execution, allowing the attacker to execute malicious commands on the system running the application. Alternatively, the attacker could overwrite files containing sensitive information, such as configuration data or credentials, leading to information exposure and potential further compromise. The CVSS v3.1 score of 9.0 indicates a critical severity, emphasizing the potential for significant damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic and system logs for attempts to exploit CVE-2026-30282 by detecting abnormal file import patterns, implement the Sigma rule <code>Detect Suspicious File Import Overwrite</code> to identify potential exploit attempts based on file events.</li>
<li>Since no patch is mentioned, consider alternative screen mirroring solutions or isolating the affected application to minimize potential damage.</li>
<li>Investigate and remediate any systems where UXGROUP LLC Cast to TV Screen Mirroring v2.2.77 is installed and showing signs of compromise.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>arbitrary-file-overwrite</category><category>code-execution</category><category>information-disclosure</category><category>cve-2026-30282</category></item></channel></rss>