<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-45224 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45224/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 11 May 2026 19:17:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45224/feed.xml" rel="self" type="application/rss+xml"/><item><title>Crabbox Path Traversal Vulnerability (CVE-2026-45224)</title><link>https://feed.craftedsignal.io/briefs/2026-05-crabbox-path-traversal/</link><pubDate>Mon, 11 May 2026 19:17:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-crabbox-path-traversal/</guid><description>Crabbox versions before 0.9.0 contain a path traversal vulnerability (CVE-2026-45224) in the Islo provider's workspace path resolution, allowing attackers to cause arbitrary file deletion and overwrite by crafting malicious .crabbox.yaml files with traversal sequences when sync.delete is enabled.</description><content:encoded><![CDATA[<p>Crabbox, a software tool with unspecified functionality, is vulnerable to a path traversal flaw affecting versions prior to 0.9.0. The vulnerability lies within the Islo provider&rsquo;s workspace path resolution logic. By supplying specially crafted <code>.crabbox.yaml</code> or <code>crabbox.yaml</code> files containing directory traversal sequences (e.g., <code>../</code>), attackers can manipulate the application to resolve paths outside the intended <code>/workspace</code> directory. When the <code>sync.delete</code> option is enabled, this vulnerability allows for arbitrary file deletion and overwrite because the application uses <code>rm -rf</code> and <code>mkdir -p</code> on the attacker-controlled, resolved path without proper input sanitization. This can lead to significant data loss or system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious <code>.crabbox.yaml</code> or <code>crabbox.yaml</code> file.</li>
<li>The malicious YAML file contains path traversal sequences (e.g., <code>../</code>) within the workspace path definition.</li>
<li>The attacker places the crafted YAML file in a location accessible to the Crabbox application.</li>
<li>The Crabbox application processes the YAML file using the Islo provider.</li>
<li>The Islo provider&rsquo;s workspace path resolution logic resolves the attacker-supplied path, failing to properly sanitize directory traversal sequences.</li>
<li>If <code>sync.delete</code> is enabled, the application executes <code>rm -rf</code> on the resolved (malicious) path, leading to arbitrary file deletion.</li>
<li>Subsequently, the application executes <code>mkdir -p</code> on the resolved path, potentially overwriting existing files and directories.</li>
<li>The attacker achieves arbitrary file deletion and overwrite, potentially leading to data loss or system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-45224 allows attackers to delete or overwrite arbitrary files and directories on the system where Crabbox is running. The severity of the impact depends on the privileges of the Crabbox process and the location of the files that are targeted. A successful attack could lead to data loss, denial of service, or in some circumstances, even remote code execution if critical system files are overwritten.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Crabbox to version 0.9.0 or later to patch CVE-2026-45224.</li>
<li>As a workaround, disable the <code>sync.delete</code> option in Crabbox configurations to mitigate the file deletion aspect of the vulnerability.</li>
<li>Implement the Sigma rule &ldquo;Detect Crabbox Path Traversal Attempt via Malicious YAML&rdquo; to detect suspicious <code>.crabbox.yaml</code> files containing path traversal sequences.</li>
<li>Monitor file system events for <code>rm -rf</code> and <code>mkdir -p</code> commands executed by the Crabbox process, especially when the target paths contain directory traversal sequences, using the Sigma rule &ldquo;Detect Suspicious rm -rf or mkdir -p with Path Traversal&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>path-traversal</category><category>file-deletion</category><category>file-overwrite</category><category>CVE-2026-45224</category></item></channel></rss>