<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-5166 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-5166/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-5166/feed.xml" rel="self" type="application/rss+xml"/><item><title>Pardus Software Center Path Traversal Vulnerability (CVE-2026-5166)</title><link>https://feed.craftedsignal.io/briefs/2024-01-pardus-path-traversal/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-pardus-path-traversal/</guid><description>CVE-2026-5166 is a path traversal vulnerability affecting TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center before version 1.0.3, allowing attackers to bypass directory restrictions.</description><content:encoded><![CDATA[<p>CVE-2026-5166 is a critical path traversal vulnerability discovered in TUBITAK BILGEM Software Technologies Research Institute Pardus Software Center, affecting versions prior to 1.0.3. This vulnerability allows an attacker to bypass directory restrictions and potentially access sensitive files or execute arbitrary code on the underlying system. Path traversal vulnerabilities arise when an application does not properly sanitize user-supplied input used to construct file paths. This can lead to unauthorized access and modification of data, potentially leading to a full system compromise. The vulnerability was published on 2026-04-29, but due to its severity, detection engineers should prioritize creating detections for it.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies an endpoint in Pardus Software Center that accepts file paths as input.</li>
<li>The attacker crafts a malicious request containing a path traversal payload, such as &ldquo;../../../etc/passwd&rdquo;.</li>
<li>The application fails to properly sanitize the input, allowing the path traversal sequence to be processed.</li>
<li>The application constructs a file path using the unsanitized input, effectively escaping the intended directory.</li>
<li>The application attempts to access the file specified by the attacker-controlled path.</li>
<li>If successful, the attacker can read sensitive files such as configuration files, user data, or system binaries.</li>
<li>The attacker may leverage the ability to read sensitive files to gain further information about the system, such as user credentials or system configuration.</li>
<li>The attacker can then exploit this information to escalate privileges or compromise other parts of the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-5166 can lead to unauthorized access to sensitive data, including configuration files, user data, and system binaries. This could allow an attacker to steal credentials, escalate privileges, or compromise the entire system. Given the CVSS v3.1 base score of 9.6, this vulnerability poses a critical risk to systems running affected versions of Pardus Software Center. The exact number of affected systems is currently unknown, but organizations using this software are urged to apply mitigations immediately.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Pardus Software Center to version 1.0.3 or later to patch CVE-2026-5166.</li>
<li>Deploy the Sigma rule <code>Pardus Software Center Path Traversal Attempt</code> to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious requests containing path traversal sequences like &ldquo;../&rdquo; or &ldquo;..&quot; to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-5166</category><category>path-traversal</category><category>web-application</category></item></channel></rss>