<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-40029 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-40029/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 22:16:23 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-40029/feed.xml" rel="self" type="application/rss+xml"/><item><title>parseusbs Unsanitized LNK File Command Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-parseusbs-cmd-injection/</link><pubDate>Wed, 08 Apr 2026 22:16:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-parseusbs-cmd-injection/</guid><description>parseusbs before 1.9 is vulnerable to OS command injection in parseUSBs.py due to unsanitized LNK file paths passed to os.popen(), allowing arbitrary command execution via crafted .lnk filenames.</description><content:encoded><![CDATA[<p>parseusbs before version 1.9 is susceptible to an OS command injection vulnerability (CVE-2026-40029) within the <code>parseUSBs.py</code> script. This flaw arises from the program&rsquo;s failure to sanitize LNK file paths before passing them to the <code>os.popen()</code> function. This allows an attacker to craft malicious .lnk filenames containing shell metacharacters. When <code>parseusbs</code> processes a USB drive containing such a file, the specially crafted filename is interpreted as a command, leading to arbitrary command execution on the system of the forensic examiner using the tool. The vulnerable versions of parseusbs are used by security professionals for USB forensic analysis, making successful exploitation dangerous for those running the tool.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious .lnk file. The filename includes shell metacharacters designed to execute arbitrary commands. For example, a filename could be <code>test.lnk; rm -rf /tmp</code>.</li>
<li>The attacker places the crafted .lnk file onto a USB drive.</li>
<li>A forensic examiner uses parseusbs (version before 1.9) to analyze the USB drive.</li>
<li>The <code>parseUSBs.py</code> script processes the files on the USB drive, including the malicious .lnk file.</li>
<li>The script extracts the .lnk file path without proper sanitization.</li>
<li>The unsanitized .lnk file path is passed to the <code>os.popen()</code> function.</li>
<li>The <code>os.popen()</code> function interprets the shell metacharacters in the filename, executing the attacker&rsquo;s injected command.</li>
<li>The attacker achieves arbitrary code execution on the examiner&rsquo;s system, allowing them to potentially compromise the system, steal sensitive data, or further pivot into the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands on the system of a forensic examiner using <code>parseusbs</code>. This could lead to complete system compromise, data exfiltration, or further malicious activities. Given that <code>parseusbs</code> is a tool used by security professionals, a successful attack could have significant consequences, potentially exposing sensitive forensic data. The impact is particularly severe as the examiner likely has access to sensitive information related to their investigations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade <code>parseusbs</code> to version 1.9 or later to remediate CVE-2026-40029.</li>
<li>Monitor process creation events for unexpected processes spawned by Python (<code>python.exe</code> or <code>python3</code>). Use the Sigma rule &ldquo;Detect Suspicious Process Creation by Python&rdquo; to detect potential exploitation attempts.</li>
<li>Implement file integrity monitoring for LNK files, particularly those found on USB drives. The Sigma rule &ldquo;Detect Creation of LNK Files in Removable Media&rdquo; can help identify suspicious LNK file creation.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>command injection</category><category>lnk</category><category>parseusbs</category><category>cve-2026-40029</category></item></channel></rss>