<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-45087 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45087/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 15:10:12 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45087/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dalfox Server Mode Vulnerable to Unauthenticated Remote Code Execution via `found-action`</title><link>https://feed.craftedsignal.io/briefs/2026-05-dalfox-rce/</link><pubDate>Tue, 12 May 2026 15:10:12 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-dalfox-rce/</guid><description>Dalfox in REST API server mode is vulnerable to unauthenticated remote code execution (CVE-2026-45087) because the server binds to 0.0.0.0:6664 by default without requiring an API key and deserializes attacker-supplied JSON in `POST /scan` without stripping the `FoundAction` and `FoundActionShell` fields, allowing arbitrary command execution.</description><content:encoded><![CDATA[<p>Dalfox, a security auditing tool, is vulnerable to unauthenticated remote code execution (CVE-2026-45087) when running in REST API server mode (<code>dalfox server</code>) with default settings. The server binds to <code>0.0.0.0:6664</code> and, unless explicitly configured with <code>--api-key</code>, does not require authentication. A flaw exists in how the server handles <code>model.Options</code>, specifically <code>FoundAction</code> and <code>FoundActionShell</code>, which are deserialized directly from attacker-supplied JSON in <code>POST /scan</code>. Because <code>dalfox.Initialize</code> propagates these fields into the final scan options without sanitization, any unauthenticated attacker can execute arbitrary shell commands on the host OS whenever a scan finding is triggered. This vulnerability affects dalfox versions 2.12.0 and earlier.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker starts a <code>dalfox server</code> instance in REST API mode without specifying an API key, leaving it open to unauthenticated access.</li>
<li>The attacker sets up a malicious web server that reflects input, ensuring any scan against it will produce a finding.</li>
<li>The attacker crafts a <code>POST</code> request to the <code>/scan</code> endpoint of the dalfox server.</li>
<li>The request includes a JSON payload containing the URL of the malicious web server and <code>options</code> with malicious values for <code>found-action</code> and <code>found-action-shell</code>.</li>
<li>The <code>postScanHandler</code> deserializes the JSON payload into a <code>Req</code> struct, including the <code>options</code> field which contains the malicious <code>FoundAction</code> and <code>FoundActionShell</code> values.</li>
<li>The <code>ScanFromAPI</code> function is called, passing the attacker-controlled options to <code>dalfox.Initialize</code>.</li>
<li><code>dalfox.Initialize</code> copies the attacker-supplied <code>FoundAction</code> and <code>FoundActionShell</code> values into the scan options without sanitization.</li>
<li>When a finding is triggered during the scan, the <code>foundAction</code> function executes the attacker-supplied shell command using <code>exec.Command</code>, achieving remote code execution on the dalfox host.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation results in unauthenticated remote code execution on the host running <code>dalfox server</code>. This grants the attacker full read access to secrets, configuration files, and credentials accessible to the dalfox process. The attacker can perform arbitrary file writes, enabling persistence, backdoor installation, and data exfiltration. The default <code>0.0.0.0</code> bind address exposes the server to all network interfaces, potentially including public-facing ones in misconfigured environments.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li><strong>Require API key:</strong> Enforce the use of <code>--api-key</code> in REST server mode by rejecting server startup if no API key is provided, as described in the remediation suggestion within the advisory.</li>
<li><strong>Strip <code>FoundAction</code> / <code>FoundActionShell</code>:</strong> Sanitize API-sourced requests by removing the <code>FoundAction</code> and <code>FoundActionShell</code> options in the <code>postScanHandler</code> to prevent untrusted callers from setting execution-control options.</li>
<li><strong>Deploy the Sigma rules:</strong> Deploy the provided Sigma rules to your SIEM and tune them for your environment to detect exploitation attempts.</li>
<li><strong>Upgrade Dalfox:</strong> Upgrade to a patched version of Dalfox that addresses CVE-2026-45087.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>rce</category><category>dalfox</category><category>cve-2026-45087</category></item></channel></rss>