<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Archive-Extraction — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/archive-extraction/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/archive-extraction/feed.xml" rel="self" type="application/rss+xml"/><item><title>Detect-It-Easy Path Traversal Vulnerability (CVE-2026-43616)</title><link>https://feed.craftedsignal.io/briefs/2024-01-detect-it-easy-path-traversal/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-detect-it-easy-path-traversal/</guid><description>Detect-It-Easy versions prior to 3.21 are vulnerable to path traversal, allowing attackers to write arbitrary files to the filesystem and potentially achieve code execution by crafting malicious archive entries.</description><content:encoded><![CDATA[<p>Detect-It-Easy (DIE) is a program used to detect file types, unpackers, compilers, and crypto information. Versions prior to 3.21 are susceptible to a path traversal vulnerability (CVE-2026-43616). This vulnerability enables a malicious actor to write arbitrary files to the underlying filesystem by crafting archive entries with relative traversal sequences (e.g., &ldquo;../../&rdquo;) or absolute paths. This can be exploited by attackers by overwriting sensitive system files or user startup scripts, thus leading to persistent code execution. The vulnerability stems from insufficient path normalization during archive extraction.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious archive (e.g., ZIP, TAR) containing files with path traversal sequences in their filenames or absolute paths.</li>
<li>The user executes Detect-It-Easy and loads the malicious archive for scanning.</li>
<li>Detect-It-Easy attempts to extract the files from the archive.</li>
<li>Due to insufficient path normalization, the application does not properly sanitize the file paths.</li>
<li>The application writes files outside the intended extraction directory.</li>
<li>The attacker overwrites a user startup script (e.g., .bashrc, .profile) with malicious code.</li>
<li>The user logs in or starts a new shell session.</li>
<li>The malicious code in the startup script executes, granting the attacker persistent access or executing arbitrary commands.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to write arbitrary files to the filesystem with the privileges of the user running Detect-It-Easy. This could lead to complete system compromise through persistent code execution. The impact includes potential data theft, malware installation, or denial of service. While the number of victims is not specified, any user running a vulnerable version of Detect-It-Easy is at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Detect-It-Easy to version 3.21 or later to patch CVE-2026-43616.</li>
<li>Implement the Sigma rule &ldquo;Detect-It-Easy Suspicious Archive Extraction&rdquo; to identify potential exploitation attempts by detecting the execution of Detect-It-Easy with archive files containing path traversal sequences.</li>
<li>Monitor file creation events for suspicious file writes outside of expected directories, particularly in user startup script locations, to detect potential exploitation based on file_event logsource.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>vulnerability</category><category>archive-extraction</category></item></channel></rss>