<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Arcane — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/arcane/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/arcane/feed.xml" rel="self" type="application/rss+xml"/><item><title>Arcane Unauthenticated Compose Template Content Disclosure</title><link>https://feed.craftedsignal.io/briefs/2024-01-arcane-template-disclosure/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-arcane-template-disclosure/</guid><description>Arcane versions before 1.18.0 are vulnerable to an unauthenticated information disclosure on four GET endpoints under `/api/templates*`, allowing unauthorized access to Compose YAML and `.env` content including sensitive secrets.</description><content:encoded><![CDATA[<p>Arcane versions prior to 1.18.0 are susceptible to an unauthenticated information disclosure vulnerability. The vulnerability stems from four <code>GET</code> endpoints under the <code>/api/templates*</code> path in Arcane&rsquo;s Huma backend that lack any security requirements. This design flaw allows any unauthenticated network client to list and read the full Compose YAML and <code>.env</code> content of every custom template stored in the instance. This includes sensitive information such as database passwords, API keys, and other secrets stored verbatim from the operator&rsquo;s environment variables due to the &ldquo;Save as Template&rdquo; workflow on project creation pages. This vulnerability poses a significant risk of exposing critical infrastructure secrets and internal service details.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies an Arcane instance running a version prior to 1.18.0.</li>
<li>The attacker sends an unauthenticated <code>GET</code> request to <code>/api/templates</code> to enumerate available templates, revealing names, descriptions, and tags.</li>
<li>The attacker sends an unauthenticated <code>GET</code> request to <code>/api/templates/{id}/content</code> to retrieve the content of a specific template.</li>
<li>The Arcane backend processes the request without authentication, due to missing security requirements on these endpoints.</li>
<li>The backend retrieves the requested template content, including the <code>Content</code> and <code>EnvContent</code> fields from the database.</li>
<li>The backend returns the template content to the attacker, including sensitive environment variables stored in plain text within the <code>EnvContent</code>.</li>
<li>The attacker extracts sensitive information, such as database passwords, API keys, and registry tokens, from the <code>EnvContent</code>.</li>
<li>The attacker uses the exposed credentials to gain unauthorized access to internal systems and services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an unauthenticated attacker to access sensitive information stored within Arcane templates. This includes database passwords, API keys, and other secrets, potentially leading to unauthorized access to critical systems and data. The enumeration of templates also reveals internal services and infrastructure details, aiding further reconnaissance. This vulnerability affects any Arcane instance running a version prior to 1.18.0 where operators have stored sensitive information in custom Compose templates.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Arcane to version 1.18.0 or later to patch the vulnerability (CVE-2026-42461).</li>
<li>Deploy the following Sigma rule to detect suspicious access to the template content endpoints.</li>
<li>Review existing templates for sensitive information and rotate any exposed credentials immediately.</li>
<li>Implement network segmentation to limit access to the Arcane instance.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>information-disclosure</category><category>vulnerability</category><category>arcane</category></item></channel></rss>